Malicious code generator identification method and system based on software structure clustering
A software structure and malicious code technology, applied in the direction of instruments, electrical digital data processing, platform integrity maintenance, etc., can solve problems such as endangering users
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0026] In order to enable those skilled in the art to better understand the technical solutions in the embodiments of the present invention, and to make the above-mentioned purposes, features and advantages of the present invention more obvious and easy to understand, the technical solutions in the present invention will be further detailed below in conjunction with the accompanying drawings illustrate.
[0027] The invention provides a malicious code generator identification method and system based on software structure clustering, which can effectively identify the malicious code generated by the malicious code generator, and then discover the template of the malicious code generator.
[0028] A malicious code generator identification method based on software structure clustering, such as figure 1 shown, including:
[0029] S101: Extract the time stamp information of the PE structure of the unknown sample;
[0030] S102: compare the time stamps of the samples using a dicho...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

