Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

68 results about "Portable Executable" patented technology

The Portable Executable (PE) format is a file format for executables, object code, DLLs, FON Font files, and others used in 32-bit and 64-bit versions of Windows operating systems. The PE format is a data structure that encapsulates the information necessary for the Windows OS loader to manage the wrapped executable code. This includes dynamic library references for linking, API export and import tables, resource management data and thread-local storage (TLS) data. On NT operating systems, the PE format is used for EXE, DLL, SYS (device driver), and other file types. The Extensible Firmware Interface (EFI) specification states that PE is the standard executable format in EFI environments.

Cluster partitioning processing method and cluster partitioning processing device for virus files

The invention discloses a cluster partitioning processing method and a cluster partitioning processing device for virus files. The method comprises the following steps of: (A) statically analyzing binary data of virus files to be partitioned, and analyzing portable executable (PE) structure data of the virus files from the binary data; and (B) comparing the PE structure data of the virus files to be partitioned, and partitioning the virus files with the PE structure data according with appointed similarity into the same category. The device comprises a first data analyzing module and a first cluster partitioning module, wherein the first data analyzing module is used for statically analyzing the binary data of the virus files to be partitioned and extracting the PE structure data of the virus files from the binary data; and the first cluster partitioning module is used for comparing the PE structure data of the virus files to be partitioned and partitioning the virus files with the PE structure data according with the appointed similarity into the same category. By the cluster partitioning processing method and the cluster partitioning processing device for the virus files, the cluster partitioning efficiency of the virus files of a computer can be improved, resource consumption is reduced, and the virus catching risk caused by the virus files which run dynamically is eliminated.
Owner:TENCENT TECH (SHENZHEN) CO LTD

Network isolation method in VPLS (Virtual Private Lan Service) and device thereof

The invention discloses a network isolation method in a VPLS (Virtual Private LAN Service) and a device thereof. The network isolation method comprises the following steps: configuring a local isolation set on a PE (Portable Executable) device; adding local ACs (Attachment Circuits) of the PE device, which belong to the same VPLS example but are needed to be isolated, into the same local isolation set; and in a message forwarding process, limiting the forwarding of the message on the basis of a VPLS source filter principle when a message output interface AC and a message input interface AC belong to the same local isolation set, thereby realizing the isolation among the local ACs of the PE device. In the invention, a global insulation set is respectively arranged on PE devices at the local and an opposite end; ACs which are on the PE devices at the local end and the opposite end, belong to the same VPLS example but are needed to be isolated are added to the same global isolation set; and in a message forwarding process, on the basis of the VPLS source filter principle, the forwarding of the message is limited when a message output interface AC and a message input interface AC belong to the same global isolation set on the PE device at a message receiving end, thus the isolation between a local AC and a far-end AC of the PE device.
Owner:XINHUASAN INFORMATION TECH CO LTD

Software protection method based on API (Application Program Interface) security attribute hiding and attack threat monitoring

The invention discloses a software protection method based on API (Application Program Interface) security attribute hiding and attack threat monitoring. The software protection method comprises the following steps: obtaining the original input information record chart of a file to be protected, extracting the execution control flow graph of the file, extracting an API calling point, extracting an API parameter passing code block, extracting an API returned value decryption point, dumping a DLL (Dynamic Link Library), calculating a new API entry address, constructing a springboard function block, inserting an exception instruction in the returned value decryption point, constructing a node, generating a node library, deploying a node network, constructing a node background, constructing a returned value decryption processing function, and reconstructing a PE (Portable Executable) file. From internal and external aspects, software is protected so as to analyze the function of API boundary information in a reverse analysis process from an angle of the reverse engineering of the attackers, the API security attribute which needs to be hidden and a detection node library are put in a program new node, and a new node entry is subjected to encryption processing to further prevent the attackers from carrying out reverse analysis on the protected PE file.
Owner:NORTHWEST UNIV(CN)

Trojan horse decision system based on dynamic code sequence tracking analysis

The invention provides a Trojan horse decision system based on dynamic code sequence tracking analysis. The system comprises an interaction module, a decision module, a virtual analysis module, a malicious intention decision sub-module, an encrypting/decrypting module and a report generating and storing module. The interaction module is a carrier of the interaction between a user and a server; the decision module is used for deciding whether a program uploaded by the user is a portable executable (PE) program or not, and whether the program is analyzed or not; the virtual analysis module is used for statically and dynamically analyzing behavior operation of suspicious programs and deciding the malicious intentions and classifications of the programs; the malicious intention decision sub-module is used for completing the decision of the malicious intention of the programs to be detected; the encrypting/decrypting module is used for encrypting/decrypting the files and data transmitted between the virtual analysis module and a server system; the report generating and storing module is used for generating an analysis report and storing the analysis report data and analyzed suspicious program samples. The Trojan horse decision system provided by the invention realizes the efficient detection, and has an effect of recognizing new varied Trojan horses.
Owner:XIAN UNIV OF POSTS & TELECOMM +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products