摘要 |
PROBLEM TO BE SOLVED: To provide a method for vulnerability analysis of a program.SOLUTION: A binary analysis module 350 of an architecture 300 receives an analysis object binary program (BPUA) 314 derived from an arranged program 112, analyzes an input-output (I/O) operation of the program, and finds a negative input and a positive input on the basis of the application of a survey technique to the BPUA and the analysis of the I/O operation. The negative input is an input for triggering a response including the vulnerability of the program, and a patch module 352 changes the arranged program on the basis of the negative input and the triggered response, develops a patch for a program for changing a program for processing at least some negative inputs without triggering a response including vulnerability, and automatically dispatches a patch-processed BPUA 364 to the arranged program.SELECTED DRAWING: Figure 3 |