Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Malicious program detection method and device

A malicious program and detection method technology, applied in the computer field, can solve the problems of increasing storage space and quantity, and achieve the effects of improving versatility, saving storage space, and improving detection efficiency

Active Publication Date: 2018-11-09
TENCENT TECH (SHENZHEN) CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Since different malicious programs have different identifiers, as the number of malicious programs increases, the number of identifiers that the terminal needs to obtain increases, and the occupied storage space increases accordingly

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious program detection method and device
  • Malicious program detection method and device
  • Malicious program detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present invention. Rather, they are merely examples of apparatuses and methods consistent with aspects of the invention as recited in the appended claims. In addition, the "first" and "second" in the following are only used to describe nouns, and do not indicate the order of execution in time.

[0028] Please refer to figure 1 , which shows a flow chart of a malicious program detection method provided by an embodiment of the present invention. This embodiment uses the malicious program detection method to be applied to a terminal as an example. The...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a malicious program detection method and device, and belongs to the technical field of computers. The method comprises the following steps that: utilizing an ARM (Advanced RISC Machines) instruction translator to execute an ARM instruction of a current row in a program; detecting whether the ARM instruction comprises a first calling function or not; when a detection result shows that the ARM instruction comprises the first calling function, obtaining a first parameter called by the first calling function from the program; detecting whether a behavior indicated by the first calling function and the first parameter is a malicious behavior or not; and when the behavior indicated by the first calling function and the first parameter is the malicious behavior, determining that the program is the malicious program. By use of the method, the problem that identification which needs to be matched with the terminal is gradually increased since the storage space, which is occupied by the identification of the malicious program, of the terminal is gradually enlarged because the terminal needs to increase the identification of the malicious program along with the increasing of the malicious program when the terminal detects whether the program is the malicious program or not according to the identification of the program is solved, and effects of saving the storage space of the terminal and improving detection efficiency are achieved.

Description

technical field [0001] The invention relates to the field of computers, in particular to a malicious program detection method and device. Background technique [0002] Malicious programs can steal or destroy data stored in the terminal. Therefore, in order to improve data security, the terminal needs to detect malicious programs. [0003] At present, for malicious programs including Advanced RISC Machines (ARM) instructions, the terminal can collect the identification of each malicious program, obtain the identification of the program to be detected, and detect whether the identification of the program to be detected is a malicious program. An identification, when the identification of the program to be detected is an identification of a malicious program, it is determined that the program to be detected is a malicious program. Wherein, the identifier is a feature code or a hash value. [0004] Since different malicious programs have different identifiers, as the number of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/56
CPCG06F21/566
Inventor 白子潘
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products