Method and device for detecting malicious software
A malicious software and detection method technology, applied in the field of information security, can solve problems such as inability to clear, incapable of comprehensive killing, eradication of viruses, and inability to meet the needs of user information security, etc., to achieve the effect of information security protection
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0021] In order to make the purpose, technical solution and advantages of the present invention clearer, the malicious software detection mechanism of the present invention will be described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific implementations described here are only used to explain the inventive concept of the malicious software detection mechanism of the present invention, and are not intended to limit the present invention.
[0022] figure 1 Schematic diagram of malware evolution. Such as figure 1 As shown, the malware initially appears as the original root carrier M, which has a strong camouflage ability, and can be generated or released by running in the user system (but not limited to these two relationships, which will be described in detail later) At least one or more subcarriers C 11 ...C 1n , at least one subcarrier C produced or released ij They can also be used as root vectors ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com