Detection of malicious behaviour of computer program
A computer program and monitoring computer technology, applied in the field of computer science, can solve the problems of high storage and calculation requirements, difficult to overcome the code, limited public information, etc., to achieve the effect of low performance cost, increased real proportion, and improved detection accuracy
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0113] The technical solutions of the embodiments will be described below in conjunction with the accompanying drawings. It can be understood that the embodiments described below are not all embodiments, but only some embodiments related to the present invention. It should be noted that other embodiments that can be obtained by those skilled in the art according to the embodiments described below are within the protection scope of the present invention without paying creative efforts.
[0114] The following combination figure 1 Describes ways to monitor computer programs on operating systems.
[0115] When the computer program runs, an API sequence is generated, and the API sequence increases continuously with the operation of the computer program, such as figure 1 Indicated by the arrow to the right of the API sequence in . Such as figure 1 The shown intercept API sequence 10, that is, the first number N1 monitoring units, includes an API sequence at a specific time t whe...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com