Method and system for preventing malicious codes from detecting virtual environments

A malicious code and virtual environment technology, applied in the field of computer network security, can solve the problems of virtual environment identification and inability to detect

Inactive Publication Date: 2016-04-13
SHENZHEN ANZHITIAN INFORMATION TECH
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Aiming at the above problems, the present invention proposes a method and system for preventing malicious code from detecting a virtual environment, and solves the problem that the virtual environment cannot be detected due to malicious code identification

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for preventing malicious codes from detecting virtual environments
  • Method and system for preventing malicious codes from detecting virtual environments

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] In order to enable those skilled in the art to better understand the technical solutions in the embodiments of the present invention, and to make the above-mentioned purposes, features and advantages of the present invention more obvious and easy to understand, the technical solutions in the present invention will be further detailed below in conjunction with the accompanying drawings illustrate.

[0027] Aiming at the above problems, the present invention proposes a method for preventing malicious codes from detecting a virtual environment, and solves the problem that the virtual environment cannot be detected after being identified by malicious codes.

[0028] A way to prevent malicious code from probing virtual environments such as figure 1 shown, including:

[0029] S101: Obtain a malicious code sample, analyze the malicious code sample, and obtain a judging condition for judging the virtual environment;

[0030] S102: Extract the parameters or data used in the ju...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and system for preventing malicious codes from detecting virtual environments. The method comprises the steps of obtaining and analyzing malicious code samples to obtain judging conditions for judging the virtual environments; extracting parameters or data and an API interface used in the judging conditions; and hooking the API, obtaining parameters or data in the virtual environments, judging whether the parameters or the data in the virtual environments are same as the parameters or the data used in the judging conditions or not one by one, if yes, randomly modifying or generating new parameters or data according to the format of the parameters or the data to replace the original parameters or data, triggering and executing the related malicious codes. The invention also provides the corresponding system structure. Through the method provided by the invention, the virtual environments can be effectively prevented from being detected by the malicious codes.

Description

technical field [0001] The invention relates to the field of computer network security, in particular to a method and system for preventing malicious code from detecting a virtual environment. Background technique [0002] With the development of computer technology, people's demand and dependence on computer information technology are becoming stronger and stronger. People's production and life are inseparable from computer technology. The widespread use of computers is also accompanied by computer security issues. Driven by interests or misguided values, some people take advantage of computer security loopholes to steal users' computer information through malicious programs, destroy computer systems, and cause economic losses to people. In order to prevent the worsening of this phenomenon, computer security personnel have developed a series of anti-virus software to detect malicious computer programs. In order to avoid the analysis and killing of anti-virus software or ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56G06F21/53
CPCG06F21/566G06F21/53G06F21/563
Inventor 康学斌朱晴肖新光
Owner SHENZHEN ANZHITIAN INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products