Virus identification method and apparatus
An identification method and technology to be identified, applied in the computer field, can solve the problems of hash value change and inability to complete calibration work, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0024] It should be understood that the specific embodiments described here are only used to explain the present disclosure, not to limit the present disclosure.
[0025] The embodiment of the first aspect of the present disclosure provides a virus identification method, which can be executed by a processor in an electronic device, see figure 1 , the method mainly includes the following processes:
[0026] Step S11, performing feature extraction on the preset key content in the mobile phone file to be identified; the preset key content includes file content that may hide malicious codes;
[0027] Those in the relevant technical fields all know that some malicious codes may be hidden in some specific files, and these files are often not detected by the system. For example, some malicious code may be hidden in the tail comment of the APP format file, or some malicious code may be disguised as an empty directory and empty file inside and / or outside META-INF. In the process of r...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com