Check patentability & draft patents in minutes with Patsnap Eureka AI!

Malicious program detection method and device

A malicious program and detection method technology, applied in the network field, can solve the problems of ineffective detection of malicious programs and difficulty of malicious program feature database, and achieve the effect of reducing detection difficulty and effective detection.

Active Publication Date: 2017-01-04
ALIBABA GRP HLDG LTD
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the method of static code scanning requires a large and comprehensive cloud platform malware feature database, and it is extremely difficult to build a rich and comprehensive cloud platform malware feature database
And attackers can easily bypass the feature matching of static scanning by modifying the code to generate variants or using obfuscation techniques such as reflection, string filling, and packing, so that malicious programs cannot be effectively detected

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious program detection method and device
  • Malicious program detection method and device
  • Malicious program detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] The implementation of the present application will be described in detail below with reference to the accompanying drawings and examples, so as to fully understand and implement the implementation process of how the present application uses technical means to solve technical problems and achieve technical effects.

[0052] In a typical configuration, a computing device includes one or more processors (CPUs), input / output interfaces, network interfaces, and memory.

[0053] Memory may include non-permanent storage in computer-readable media, in the form of random access memory (RAM) and / or nonvolatile memory, such as read-only memory (ROM) or flash RAM. Memory is an example of computer readable media.

[0054]Computer-readable media, including both permanent and non-permanent, removable and non-removable media, can be implemented by any method or technology for storage of information. Information may be computer readable instructions, data structures, modules of a progr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a malicious program detection method and device. The method includes the steps: acquiring an API (application program interface) called by a user program and plugging a first AOP (aspect-oriented programming) section into the API; acquiring running contextual information through the first AOP section; judging whether the API is an illegal API or not according to the running contextual information; determining whether the user program is a malicious program or not according to judgment results. Detection difficulty is reduced, and the malicious program is effectively detected.

Description

technical field [0001] The present application belongs to the field of network technology, and in particular relates to a malicious program detection method and device. Background technique [0002] Cloud computing is a nascent field that has developed rapidly in scientific research institutions and industries in recent years. The cloud computing platform is an open service and multi-tenant sharing platform. Cloud tenants can rent the cloud computing platform and upload any user programs to run. At the same time, the computing and storage resources of the entire platform are shared by all user programs. This service form of the cloud computing platform brings huge security challenges. The programs uploaded by cloud tenants may have malicious behaviors, which may affect the running of other platform tenant programs and steal the data of other platform tenants. Therefore, cloud tenants usually pass security Isolation technology, such as "sandbox" for security isolation. Howe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56
CPCG06F21/566G06F2221/034G06F21/00
Inventor 周灿
Owner ALIBABA GRP HLDG LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More