Supercharge Your Innovation With Domain-Expert AI Agents!

Trojan horse virus detection device and method

A virus detection and Trojan horse technology, applied in the field of information security, can solve problems such as leaking, not paying attention to confidential data or private information, and achieve the effects of maintaining information security, reducing detection costs, and reducing workload

Pending Publication Date: 2022-03-22
HUAZHONG UNIV OF SCI & TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, none of the above-mentioned channels has paid attention to the fact that confidential data or private information may be leaked in the form of ultrasonic waves through the speaker of the device, and no effective detection method has been proposed for such Trojan horse viruses.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trojan horse virus detection device and method
  • Trojan horse virus detection device and method
  • Trojan horse virus detection device and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention. In addition, the technical features involved in the various embodiments of the present invention described below can be combined with each other as long as they do not constitute a conflict with each other.

[0039] In the present invention, the terms "first", "second" and the like (if any) in the present invention and drawings are used to distinguish similar objects, and are not necessarily used to describe a specific order or sequence.

[0040] It should be noted that the ultrasonic wave is beyond the range that can be distinguished by the human ear, but it is still within the frequency range of th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a Trojan virus detection device and method, and belongs to the technical field of information security. According to the Trojan virus detection device and method, the fact that Trojan viruses may steal information by controlling a computer loudspeaker to emit ultrasonic signals is found for the first time, the Trojan virus detection device and method are provided for the discovery, and the ultrasonic signals emitted by the computer loudspeaker are collected and then filtered and amplified; and decoding the processed ultrasonic signals to obtain corresponding frequency spectrum information, further analyzing the frequency spectrum information, and judging that the to-be-detected equipment is invaded by Trojan viruses if signal peak values exceed a preset threshold value in a preset sampling period. Therefore, the Trojan virus which steals the information stored in the to-be-detected equipment by controlling the loudspeaker of the to-be-detected equipment to emit the ultrasonic signal can be effectively detected, and the information security of the equipment can be maintained.

Description

technical field [0001] The invention belongs to the technical field of information security, and more specifically relates to a Trojan horse virus detection device and method. Background technique [0002] With the popularization of mobile smart terminals, malicious Trojan horse attacks and malicious Trojan horse detection technologies on mobile smart terminals have attracted more and more attention. Malicious Trojan horse programs can steal the private information stored on the user's device by concealing implantation into the user's device and send it to the attacker; at the same time, it will also maliciously consume the resources of the user's device, such as CPU, memory, network bandwidth, battery power, etc. It brings serious privacy threats and tariff consumption to users. [0003] Under the existing technical conditions, in order to resist malicious Trojan horse attack technology, the current mainstream Trojan horse detection methods mainly include: [0004] Monito...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/56G06K9/00
CPCG06F21/561G06F2218/02G06F2218/10
Inventor 钟国辉石功成张锐堃甄宗玮张成伟高雅玙
Owner HUAZHONG UNIV OF SCI & TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More