18117850. VULNERABILITY DETECTION METHOD AND DEVICE simplified abstract (SAMSUNG ELECTRONICS CO., LTD.)

From WikiPatents
Jump to navigation Jump to search

VULNERABILITY DETECTION METHOD AND DEVICE

Organization Name

SAMSUNG ELECTRONICS CO., LTD.

Inventor(s)

Jianyun Qu of Shaanxi (CN)

Yinxiu Guo of Shaanxi (CN)

Hanbing Zhang of Shaanxi (CN)

Mao Zhang of Shaanx (CN)

VULNERABILITY DETECTION METHOD AND DEVICE - A simplified explanation of the abstract

This abstract first appeared for US patent application 18117850 titled 'VULNERABILITY DETECTION METHOD AND DEVICE

Simplified Explanation

The abstract describes a method for detecting vulnerabilities in a device driver by mutating a target test program and analyzing the running information obtained during execution.

  • The method starts by obtaining a target test program that includes system calls and their corresponding input parameters required for the normal running of a device driver.
  • The system calls in the test program are arranged based on their calling relationship for the normal running of the device driver.
  • A sequence to be inserted is obtained, which includes at least one system call.
  • The target test program is mutated by inserting the sequence and corresponding second input parameters.
  • The mutated target test program is executed, and running information about the device driver is collected.
  • Based on the collected running information, vulnerabilities of the device driver are detected.

Potential applications of this technology:

  • Vulnerability detection in device drivers: This method can be used to identify vulnerabilities in device drivers, which are crucial for the proper functioning of hardware devices. By detecting vulnerabilities, developers can fix them and enhance the security and stability of the device driver.

Problems solved by this technology:

  • Vulnerability detection automation: The method automates the process of detecting vulnerabilities in device drivers. It eliminates the need for manual analysis and testing, saving time and effort for developers.

Benefits of this technology:

  • Improved device driver security: By detecting vulnerabilities, this method helps in improving the security of device drivers, reducing the risk of exploitation by malicious actors.
  • Enhanced stability: Identifying vulnerabilities allows developers to fix them, leading to more stable and reliable device drivers.
  • Time and cost savings: The automation of vulnerability detection reduces the need for manual analysis and testing, saving time and resources for developers.


Original Abstract Submitted

A vulnerability detection method includes obtaining a target test program including system calls and first input parameters corresponding to the system calls required for normal running of a device driver, where the system calls are arranged based on a calling relationship for the normal running of the device driver, obtaining a sequence to be inserted, wherein the sequence to be inserted comprises at least one system call, mutating the target test program based on the sequence to be inserted and second input parameters corresponding to the sequence to be inserted, and detecting a vulnerability of the device driver based on running information about the device driver obtained during execution of the mutated target test program.