Method and device for preventing malicious code execution

A malicious code and code technology, applied in the Internet field, can solve problems such as tampering with the browser homepage, and achieve the effect of preventing tampering with the browser homepage

Pending Publication Date: 2020-05-22
TENCENT TECH (SHENZHEN) CO LTD
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present application provides a method for preventing the execution of malicious codes, which can solve the problem of tampering with the browser homepage by malicious applications

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for preventing malicious code execution
  • Method and device for preventing malicious code execution
  • Method and device for preventing malicious code execution

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] In order to make the purpose, technical solution and advantages of the present application clearer, the implementation manners of the present application will be further described in detail below in conjunction with the accompanying drawings.

[0045] A method for preventing execution of malicious codes provided in the embodiment of the present application may be implemented by a computer device, which may be a desktop computer, a portable computer, or the like. A browser and a security protection application program can be installed in the computer device, and the security protection application program can be an application program that only has a browser security protection function, or can be an application program that has network security, virus killing, payment protection, and browser security functions. A comprehensive security protection application program with functions such as protection, the driver of the security protection application program can monitor t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for preventing malicious code execution, and belongs to the technical field of the Internet. The method comprises the steps of receiving a browser homepage locking instruction input by a user; starting to monitor an establishment event of the browser process; after it is monitored that the browser process is established, when a preset triggering event used for triggering code calling is detected, obtaining a target memory address used for conducting code calling; obtaining a target code stored in the target memory address; and based on a malicious code library,determining whether the target code is a malicious code; and after determining that the target code is the malicious code, preventing the target code from being executed. Through the method and the device, malicious application programs can be effectively prevented from tampering the browser homepage.

Description

technical field [0001] The present application relates to the technical field of the Internet, in particular to a method and device for preventing execution of malicious codes. Background technique [0002] A browser is a type of application program that is commonly used by people. Some malicious applications will use various technical means to tamper with the homepage of the browser to display various promotional information on the homepage of the browser to achieve the purpose of profit. [0003] The more commonly used method for malicious applications to tamper with the browser homepage is: the malicious application process simulates the function of the LoadLibrary function called when the memory is loaded, and writes its own homepage tampering function module into the browser process across processes. Among them, the LoadLibrary function The function of is to write a certain function module into the target process through a system call. Then, an executable shellcode is...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55G06F21/56
CPCG06F21/554G06F21/563G06F21/566
Inventor 焦晴阳
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products