CPC G06F 21/577 (2013.01) [G06F 2221/033 (2013.01)] | 18 Claims |
1. A file vulnerability detection method comprising:
translating a binary file into an intermediate file;
analyzing the intermediate file to obtain multiple functions to be tested;
establishing function data of each of the functions to be tested; and
comparing correlations between the function data of each of the functions to be tested and function data of at least one function having a version with vulnerability and a version without vulnerability in a vulnerability database based on a characteristic model, to determine whether each of the functions to be tested corresponding to each function data has a vulnerability, wherein the characteristic model has information representing multiple back-end binary files generated by multiple back-end platforms;
wherein when each function data has a function name, a processor compares each function data with the function data having the function name in the at least one function having the version with vulnerability to generate a first similarity; when each function data has the function name, the processor compares each function data with the function data having the function name in the at least one function having the version without vulnerability to generate a second similarity; and the processor determines whether each of the functions to be tested corresponding to each function data has the vulnerability according to the first similarity and the second similarity.
|