Automatic analysis system and method for malicious code
A malicious code, automatic analysis technology, applied in the field of malicious code automatic analysis system, to achieve the effect of improving work efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0028] Such as figure 1 As shown in the figure, before the malicious code runs, the user first needs to define a batch of functions. Generally, normal applications rarely use these functions, or there is no need to use these functions, and the probability of using these functions by malicious code is quite high.
[0029] Before the system starts analysis, it will load all API (Application programming interface) (application programming interface) function lists from the database. When the malicious code calls the above-mentioned user-defined sensitive functions, it will record the function calls.
[0030] When the API function is loaded, the system will load the driver to record the access and operation of files, registry and network by malicious code.
[0031] When the malicious code finishes running, the system will automatically analyze its mechanism based on various behaviors recorded during the running of the malicious code.
[0032] figure 2 It is a relationship diagr...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com