A Malicious Code Discovery Method for Industrial Control Equipment
A malicious code and discovery method technology, applied in the fields of instrumentation, computing, electrical digital data processing, etc., can solve the problem of lack of remote malicious code and so on
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0030] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described below in conjunction with the accompanying drawings and embodiments. The specific embodiments described here are only used to explain the algorithm of the present invention, and do not limit the implementation language of the present invention.
[0031] The industrial control terminal protection application consists of the following modules:
[0032] 1) Timing module;
[0033] 2) process snapshot capture module;
[0034] 3) thread snapshot analysis module;
[0035] 4) Address analysis module;
[0036] 5) Code analysis module;
[0037] After the industrial control terminal protection application is started, the following logic is executed:
[0038] 1) When the industrial control terminal protection application is started, the timing module, the process snapshot capture module, the on-site snapshot analysis module, and the a...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


