Malicious program behavior capture method based on Qemu
A technology of malicious programs and emulators, applied in malicious program behavior analysis, computer security field, can solve incomplete, inaccurate, easy to be bypassed and other problems
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0079] The present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.
[0080] Such as figure 1 As shown, the present invention provides a kind of malicious program behavior capture method based on Qemu emulator, this method directly inserts malicious program behavior capture module in the source code of Qemu simulator, is encapsulated with reading string function in the malicious program behavior capture module , here, the malicious program behavior capture module is also a series of software codes, the functions of the software code will be described in detail in the following schemes, the malicious program behavior capture module is preferably inserted into the instruction translation code part in the source code of the Qemu emulator , which can eliminate the semantic gap between the data of the Qemu simulator and the guest operating system when the malicious program sample is running; the Qemu simulator is a s...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com