Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Virus signature processing method and device

A virus signature and processing method technology, applied in the field of virus signature processing methods and devices, can solve the problems of long signature generation cycle, low signature efficiency, low efficiency, etc., to avoid subjective differences, ensure real-time requirements, Guaranteed accuracy

Active Publication Date: 2021-01-15
TENCENT TECH (SHENZHEN) CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] 1) A large number of experienced personnel are required to analyze malicious samples to extract signatures, so as to meet the needs of updating signatures in real time according to emerging viruses, and the efficiency is low
[0007] 2) As the growth rate of viruses continues to increase, manual methods are difficult to meet the real-time requirements of malicious code detection; and the efficiency of manual analysis and extraction of signatures is relatively low, and the generation cycle of signatures is longer, resulting in the detection of malicious codes has a certain hysteresis
[0008] To sum up, there is no effective solution for the automatic and accurate extraction of virus signatures, which can improve the accuracy and real-time performance of virus detection.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Virus signature processing method and device
  • Virus signature processing method and device
  • Virus signature processing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The present invention will be described in further detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the examples provided here are only used to explain the present invention, not to limit the present invention. In addition, the embodiments provided below are some embodiments for implementing the present invention, rather than providing all embodiments for implementing the present invention. Under the premise that those skilled in the art do not pay creative work, the technical solutions of the following embodiments Embodiments obtained through recombination and other embodiments based on the implementation of the invention all belong to the protection scope of the present invention.

[0040] It should be noted that, in the embodiments of the present invention, the terms "comprising", "comprising" or any other variant thereof are intended to cover a non-exclusive inclusion, so that a method or device comprising a se...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a virus feature code processing method and device. The method comprises the following steps that: carrying out disassembling processing on a malicious sample which carries viruses, carrying out segmentation on an obtained disassembling code to obtain a plurality of code blocks of the malicious sample; calculating the features of code blocks in each malicious sample, and onthe basis of the sequence of the code blocks in the malicious sample, constructing a feature sequence formed by the features of the code blocks in the malicious sample; comparing the feature sequenceof the malicious sample, and determining the common subsequence of the feature sequences of at least two malicious samples; and according to the common subsequence, judging the corresponding code is the code of the virus, and connecting the features in the common subsequence to obtain the feature code of the virus. When the method is implemented, the feature codes of the virus can be automaticallyand accurately extracted so as to improve virus detection accuracy and instantaneity.

Description

technical field [0001] The invention relates to security technology, in particular to a method and device for processing virus signature codes. Background technique [0002] Computer viruses, also known as viruses, are malicious purpose codes implanted by compilers in devices (smartphones, tablets, laptops, desktop computers, servers, and other computing devices) to destroy device functions or data. [0003] Viruses are usually used as (for example, packed) independent applications in devices to deceive users into running to achieve malicious purposes, or are embedded in re-encapsulated conventional applications to achieve malicious purposes during the running of conventional applications. [0004] Related technologies mainly rely on manually extracting virus signatures, scanning the characteristics of the samples to be detected in the device and comparing them with the virus signatures, using recognition rules to compare and process the results, and judging whether there is...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/56
CPCG06F21/563G06F21/564G06F21/566
Inventor 罗元海
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products