Analysis method for newly appearing malicious codes
A malicious code and analysis method technology, applied in the direction of instruments, computing, electrical digital data processing, etc., can solve the problems of fuzzy distinction, inability to use anti-virus, reduce the effect of malicious code analysis and processing, and achieve the effect of easy detection
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0022] The method of the present invention will be further described in detail below.
[0023] A method for analyzing new malicious codes, the steps are as follows:
[0024] S1: Configure the simulated running parameters, set a set of running data, ensure that the software in the storage hardware can be tested and verified during the data running process, and set a set of detection data at the same time to detect the number of files inside the storage hardware and increase Detect the operating parameters of the corresponding malicious program, and then set the text parameters. When the malicious program is detected as a whole, open the text program, and the text program records the solutions to various malicious programs. The operating data and guaranteed data include detectable operating status and hardware. There are at least two sets of programming codes for the number of internal software, operating data and guaranteed data. The content recorded in the text program is comm...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com