Malicious code searching and killing method and device and storage medium

A malicious code and killing technology, applied in the direction of platform integrity maintenance, etc., can solve the problems of increasing the exposure of malicious code signature database and the difficulty of cracking

Pending Publication Date: 2022-04-15
BEIJING KINGSOFT SECURITY MANAGEMENT SYST TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention provides a method, device, and storage medium for detecting and killing malicious codes. By integrating malicious code feature library files and malicious code checking and killing tool files into a whole, it increases the difficulty of exposing and cracking malicious code feature libraries, and solves the problem of malicious code features. The problem of library files being analyzed and reverse cracked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious code searching and killing method and device and storage medium
  • Malicious code searching and killing method and device and storage medium
  • Malicious code searching and killing method and device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0024] According to an embodiment of the present invention, a method for checking and killing malicious code is provided, figure 1 It is a flow chart of the method for checking and killing malicious codes, including the following steps: merging the feature library of malicious codes with the first checking and killing program for malicious codes to form a second checking and killing program for malicious codes; Malicious code feature data to internal memory; Call t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a malicious code searching and killing method and device and a storage medium, and relates to the technical field of computer system security. The method comprises the following steps: fusing a malicious code feature library with a first malicious code searching and killing program to form a second malicious code searching and killing program; reading malicious code feature data in the second malicious code searching and killing program to a memory; calling the second malicious code searching and killing program, traversing the whole file, and comparing the file with the malicious code feature data in the memory; if the malicious code feature data is matched with the malicious code feature data, judging that the code is a malicious code; and if the malicious code feature data is not matched with the malicious code feature data, judging that the code is a non-malicious code. The method is used for solving the problem that malicious code feature library files independently stored in a disk are analyzed and reversely cracked. The invention also provides a malicious file searching and killing device and a computer readable storage medium, which have the above beneficial effects.

Description

technical field [0001] The invention relates to the technical field of computer system security, in particular to a malicious code scanning and killing method, device and storage medium. Background technique [0002] With the rapid development of the mobile Internet, various smart devices have gradually become popular in people's lives and work, and various threats have followed, among which malicious code is one of the common threats. At present, the mainstream methods for detecting malicious code include: signature code method, checksum method, behavior monitoring method, software simulation method, and heuristic scanning. These methods are based on different principles, and the cost and detection range required for implementation are different. Each has its own strengths. The feature code method is the simplest and most direct method to detect known malicious codes. [0003] The traditional signature code method reads the known malicious code signature library file data...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56
Inventor 周震
Owner BEIJING KINGSOFT SECURITY MANAGEMENT SYST TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products