System and method used for detecting malicious code of random access memory
A technique of malicious code, code, applied in the system field of malicious code
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0020] Exemplary aspects of the invention are described herein in the context of systems, methods, and computer program products for detecting malicious code in random access memory. Those of ordinary skill in the art will recognize that the following description is exemplary only and is not intended to be limiting in any way. Others will readily suggest themselves to those skilled in the art having the benefit of this disclosure. Reference will now be made in detail to exemplary aspect embodiments as illustrated in the accompanying drawings. The same reference designators will be used throughout the drawings and the following description, to the extent possible, to refer to the same or like items.
[0021] Malicious code (or a program or application) may be computer instructions that cause damage to a computer or a computer user, such as a worm, keylogger, or computer virus. Damage caused may be unauthorized access to computer resources, including data stored on the compute...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com