The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Jul. 02, 2019

Filed:

Jul. 16, 2018
Applicant:

Korea Internet & Security Agency, Jeollanam-do, KR;

Inventors:

Hwan Kuk Kim, Jeollanam-do, KR;

Tae Eun Kim, Jeollanam-do, KR;

Sang Hwan Oh, Jeollanam-do, KR;

Soo Jin Yoon, Jeollanam-do, KR;

Jee Soo Jurn, Jeollanam-do, KR;

Geon Bae Na, Jeollanam-do, KR;

Assignee:
Attorney:
Primary Examiner:
Assistant Examiner:
Int. Cl.
CPC ...
G06F 11/00 (2006.01); G06F 12/14 (2006.01); G06F 12/16 (2006.01); G08B 23/00 (2006.01); G06F 21/57 (2013.01);
U.S. Cl.
CPC ...
G06F 21/577 (2013.01); G06F 2221/034 (2013.01);
Abstract

Provided are a binary vulnerability analysis method performed by a computing device is provided, and the binary vulnerability analysis method includes a primary execution step of recording a symbolic constraint of a vulnerability associated with an execution flow path causing a crash to a target binary to be analyzed and a suspicious element on the execution flow path by performing taint analysis through a primary execution of the target binary; and a secondary execution step of performing a secondary execution, which is a symbolic execution, on the execution flow path and, if an instruction satisfying the symbolic constraint is found, determining that the vulnerability exists in the target binary by comparing the suspicious element and the found instruction.


Find Patent Forward Citations

Loading…