CN102156834B - Method for realizing program killing prevention - Google Patents
Method for realizing program killing prevention Download PDFInfo
- Publication number
- CN102156834B CN102156834B CN2011100966545A CN201110096654A CN102156834B CN 102156834 B CN102156834 B CN 102156834B CN 2011100966545 A CN2011100966545 A CN 2011100966545A CN 201110096654 A CN201110096654 A CN 201110096654A CN 102156834 B CN102156834 B CN 102156834B
- Authority
- CN
- China
- Prior art keywords
- obreferenceobjectbyhandle
- detourobreferenceobjectbyhandle
- program
- byte
- bytes
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Landscapes
- Debugging And Monitoring (AREA)
Abstract
Description
Claims (6)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011100966545A CN102156834B (en) | 2011-04-18 | 2011-04-18 | Method for realizing program killing prevention |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011100966545A CN102156834B (en) | 2011-04-18 | 2011-04-18 | Method for realizing program killing prevention |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102156834A CN102156834A (en) | 2011-08-17 |
CN102156834B true CN102156834B (en) | 2013-04-24 |
Family
ID=44438326
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2011100966545A Expired - Fee Related CN102156834B (en) | 2011-04-18 | 2011-04-18 | Method for realizing program killing prevention |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102156834B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103116724B (en) * | 2013-03-14 | 2015-08-12 | 北京奇虎科技有限公司 | The method of locator(-ter) sample hazardous act and device |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102768720B (en) * | 2012-03-20 | 2019-02-22 | 新奥特(北京)视频技术有限公司 | A kind of method of Process Protection |
CN102799493A (en) * | 2012-06-21 | 2012-11-28 | 北京伸得纬科技有限公司 | Method for intercepting target progress with self-protection |
CN106682493B (en) * | 2015-11-06 | 2019-08-27 | 珠海豹趣科技有限公司 | A kind of method, apparatus for preventing process from maliciously being terminated and electronic equipment |
CN106886691B (en) * | 2015-12-15 | 2020-01-14 | 珠海豹趣科技有限公司 | Interception method and device for ending process operation and electronic equipment |
CN106469272A (en) * | 2016-08-31 | 2017-03-01 | 北京力鼎创软科技有限公司 | A kind of windows process protection method and system |
CN109711153B (en) * | 2018-12-26 | 2021-03-19 | 北京北信源信息安全技术有限公司 | Windows process protection method and system |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
NO20050564D0 (en) * | 2005-02-02 | 2005-02-02 | Tore Lysemose Hansen | Program monitor to identify unauthorized intrusion into computer systems |
CN100504904C (en) * | 2007-12-25 | 2009-06-24 | 北京大学 | Windows concealed malevolence software detection method |
CN101304409B (en) * | 2008-06-28 | 2011-04-13 | 成都市华为赛门铁克科技有限公司 | Method and system for detecting malice code |
-
2011
- 2011-04-18 CN CN2011100966545A patent/CN102156834B/en not_active Expired - Fee Related
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103116724B (en) * | 2013-03-14 | 2015-08-12 | 北京奇虎科技有限公司 | The method of locator(-ter) sample hazardous act and device |
Also Published As
Publication number | Publication date |
---|---|
CN102156834A (en) | 2011-08-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102156834B (en) | Method for realizing program killing prevention | |
KR102307534B1 (en) | Systems and methods for tracking malicious behavior across multiple software entities | |
JP6212548B2 (en) | Kernel-level security agent | |
AU2006210698B2 (en) | Intrusion detection for computer programs | |
US20090177883A1 (en) | Method and device for online secure logging-on | |
CN101902481B (en) | Real-time monitoring method and device for webpage Trojan horse | |
US9542557B2 (en) | Snoop-based kernel integrity monitoring apparatus and method thereof | |
CN101013461A (en) | Method of computer protection based on program behavior analysis | |
US11120106B2 (en) | Hardware—assisted system and method for detecting and analyzing system calls made to an operating system kernel | |
JP2019521400A (en) | Detecting speculative exploit attempts | |
CN106055385A (en) | System and method for monitoring virtual machine process, and method for filtering page fault anomaly | |
CN102831356A (en) | Software dynamic credibility authentication method based on software fingerprint | |
CN101599113A (en) | Driven malware defence method and device | |
US20160246590A1 (en) | Priority Status of Security Patches to RASP-Secured Applications | |
CN113051034A (en) | Container access control method and system based on kprobes | |
CN105426751A (en) | Method and device for preventing system time from being tampered | |
CN113395694A (en) | Intelligent security defense system and defense method based on 5G and local area base station | |
CN101604370A (en) | A kind of method of monitoring Windows kernel function call of highly compatible | |
CN103353930A (en) | Method and device for preventing infectious virus infection | |
CN102081720B (en) | Method and system for detecting process creation during real-time protection | |
KR101580624B1 (en) | Method of Penalty-based Unknown Malware Detection and Response | |
CN106557693A (en) | A kind of malice Hook behavioral value method and system | |
CN102819703A (en) | Method and equipment used for preventing webpage attack | |
EP3831031A1 (en) | Listen mode for application operation whitelisting mechanisms | |
CN109033821A (en) | A kind of Stack Smashing Protection System and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
PE01 | Entry into force of the registration of the contract for pledge of patent right |
Denomination of invention: Method for realizing program killing prevention Effective date of registration: 20131226 Granted publication date: 20130424 Pledgee: Bank of Communications Ltd. Beijing Zhongguancun Park sub branch Pledgor: STRONGUNION TECHNOLOGY Co.,Ltd. Registration number: 2013990001026 |
|
PLDC | Enforcement, change and cancellation of contracts on pledge of patent right or utility model | ||
PC01 | Cancellation of the registration of the contract for pledge of patent right |
Date of cancellation: 20150203 Granted publication date: 20130424 Pledgee: Bank of Communications Ltd. Beijing Zhongguancun Park sub branch Pledgor: STRONGUNION TECHNOLOGY Co.,Ltd. Registration number: 2013990001026 |
|
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20130424 Termination date: 20210418 |