Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method, device and terminal for checking and killing loader virus

A loader and virus technology, applied in the field of network security, can solve problems such as high database cost, false positives, and affecting user experience, and achieve the effect of low maintenance cost and high accuracy

Active Publication Date: 2017-07-25
ZHUHAI BAOQU TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the large number of main programs and frequent updates, the cost of maintaining the database is very high. Once the maintenance is not synchronized, the probability of false positives is very high, which affects the user experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and terminal for checking and killing loader virus
  • Method, device and terminal for checking and killing loader virus
  • Method, device and terminal for checking and killing loader virus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0025] The device for checking and killing the Loader virus in the embodiment of the present invention (hereinafter referred to as "the device of the present invention") is built in a terminal, and the terminal may include a personal computer, a smart phone, a tablet computer, a game console, and an e-reader, etc. The terminal can install or run programs.

[0026] It should be understood that the Loader virus in the embodiment of the present invention is a Trojan h...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a Loader virus searching and killing method. The method comprises the first step of obtaining a dynamic link library (DLL) file of a target detection program, the second step of extracting multiple derived functions of the DLL file of the target detection program, the third step of judging whether one, and only one derived function which has a logical function exists among the multiple derived functions of the DLL file or not, and if yes, determining the DLL file of the target detection program is a Loader virus, and the fourth step of removing or isolating the target detection program. Correspondingly, the embodiment of the invention further discloses a Loader virus searching and killing device and a terminal. The Loader virus searching and killing method and device and the terminal can achieve searching and killing of the Loader virus and have the advantages that the maintenance cost is low and accuracy is high.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a method, device and terminal for checking and killing Loader viruses. Background technique [0002] Trojan horse virus is a common computer virus, which hides in the host computer. Virus authors can use Trojan horse virus to destroy the host computer, steal files, or remotely control it. For example, virus authors can use Trojan horse virus to remotely control the host computer to execute Sensitive operations such as "switching the camera" or "switching the microphone" pose a great threat to the user's privacy. Wherein, loader (Loader) virus just belongs to trojan horse virus, and loader virus usually pretends to be the DLL (Dynamic Link Library, Dynamic Link Library) file of the main program, and runs with the main program startup. It should be pointed out that the main program attached to the loader virus is often a program of a well-known company, with a digital sig...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/56
CPCG06F21/566
Inventor 陈根刘桂峰姚辉
Owner ZHUHAI BAOQU TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products