Unlock instant, AI-driven research and patent intelligence for your innovation.

Malicious document detection method and device

A detection method and document technology, applied in computer security devices, instruments, computing, etc., can solve the problem of low detection accuracy of malicious documents

Active Publication Date: 2020-10-20
BEIJING QIHOO TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, whether a document is a malicious document is detected by signature matching. However, some malicious execution programs are embedded in documents in encrypted form, and encrypted malicious execution programs will evade the detection mechanism of signature matching. Therefore, the existing Low detection accuracy of malicious documents in technology

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious document detection method and device
  • Malicious document detection method and device
  • Malicious document detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0022] Embodiments of the present invention provide a method for detecting malicious documents, such as figure 1 As shown, the method includes:

[0023] 101. Decrypt the suspicious document according to a preset logical operation.

[0024] Wherein, the suspicious document may be a PDF document, a Word document, a TXT document, a picture document, a video document, etc., which are not specifically limited in this embodiment of the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and device for detecting a malicious document, relates to the technical field of computer safety and solves the problem that the precision for existing detection of malicious documents is low. The main technical scheme disclosed by the invention comprises the steps that a suspicious document is decrypted according to preset logic operations; whether the decrypted suspicious document contains a malicious execution program is detected; and if the program is contained, the suspicious document is deemed as a malicious document. The method and device disclosed by the invention are mainly used for detecting the malicious document.

Description

technical field [0001] The invention relates to the technical field of computer security, in particular to a method and device for detecting malicious documents. Background technique [0002] The causes of software vulnerabilities are due to the limitations of the development language itself, or due to the negligence of software authors due to imperfect programming or insufficient security awareness during the development period. Malicious document is an abnormal document intentionally made according to the loopholes in the software that loads the document. Specifically, the malicious document can be DOC, PDF, XLS, PPT and other documents. After the malicious document is opened in a specific environment, the malicious execution program embedded in the malicious document will be successfully executed, and the computer will be attacked by executing the malicious program. [0003] At present, it is detected whether a document is a malicious document by means of signature match...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/56
CPCG06F21/562G06F21/566
Inventor 田阗边亮
Owner BEIJING QIHOO TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More