Malicious software detection method and device
A malware and detection method technology, applied in the direction of platform integrity maintenance, etc., can solve the problems of insufficient scalability of dynamic detection methods, inaccurate detection results, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0064] Dynamic detection methods are not scalable enough. Moreover, because the excitation conditions cannot be satisfied, some malicious software behaviors cannot be displayed, and the malicious software cannot be detected in time, and the detection results are not accurate.
[0065] In order to solve the above problems, an embodiment of the present invention provides a malware detection method. Embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be noted that, in the case of no conflict, the embodiments and the features in the embodiments of the present invention can be combined arbitrarily with each other.
[0066] First, Embodiment 1 of the present invention will be described with reference to the accompanying drawings.
[0067] like figure 1 As shown, the embodiment of the present invention provides a malware detection system, which includes the following:
[0068] Upload servers, malware data...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com