Method and device for automatically processing malicious code sample

A malicious code and automatic processing technology, applied in the computer field, can solve problems such as powerlessness, and achieve the effect of reducing false alarm rate and accurate identification

Inactive Publication Date: 2014-04-30
BEIJING QIHOO TECH CO LTD +1
View PDF2 Cites 52 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It is even more helpless for

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for automatically processing malicious code sample
  • Method and device for automatically processing malicious code sample
  • Method and device for automatically processing malicious code sample

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0060] Such as figure 1 As shown, it is one of the flowcharts of the method for automatic processing of malicious code samples in the embodiment of the present invention. The method 100 for automatic processing of malicious code samples includes

[0061] Step S101, obtaining a malicious code sample.

[0062] The above malicious code samples refer to the physical form of files storing malicious codes, which can be independent malic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and device for automatically processing a malicious code sample. The method includes the steps of obtaining the malicious code sample, extracting static characteristics from the obtained malicious code sample, matching the static characteristics of the malicious code sample with known static characteristics in a static characteristic library, continuing to extract dynamic behavior characteristics from the malicious code sample if it cannot be judged that the obtained malicious code sample is a malicious code according to the static characteristic library, matching the dynamic behavior characteristics of the malicious code sample with known dynamic behavior characteristics in a dynamic behavior characteristic library, and conducting false alarm feedback if it can be judged that the obtained malicious code sample is not a malicious code according to the dynamic behavior characteristic library so as to prompt that the malicious code sample is a non-malicious code. The malicious code sample can be accurately recognized, and the false alarm rate of the malicious code is lowered.

Description

technical field [0001] The invention belongs to the technical field of computers, and in particular relates to a method and a device for automatically processing malicious code samples. Background technique [0002] Malicious code is also known as Malware. Malicious code is "a set of instructions that run on a computer to make the system perform tasks according to the attacker's wishes." Malicious code embeds instructions into other codes under the condition of concealing itself, so as to destroy the integrity of data information on the infected computer and run intrusive programs. The types of malicious code include computer virus (Virus), worm (Worm), Trojan horse (Trojan horse), botnet (Botnet), spy network (spyware), backdoor (Backdoor), Rootkitsd, etc. [0003] At present, computer malicious codes are spreading at an alarming speed, posing a serious threat to the security of computer systems. Early anti-virus software used the static feature of malicious code signatu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/56
CPCG06F21/563G06F21/566G06F2221/033
Inventor 边亮于春功
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products