CN103136475A - Method and device for detecting computer viruses - Google Patents

Method and device for detecting computer viruses Download PDF

Info

Publication number
CN103136475A
CN103136475A CN2011103885840A CN201110388584A CN103136475A CN 103136475 A CN103136475 A CN 103136475A CN 2011103885840 A CN2011103885840 A CN 2011103885840A CN 201110388584 A CN201110388584 A CN 201110388584A CN 103136475 A CN103136475 A CN 103136475A
Authority
CN
China
Prior art keywords
api
operating system
system api
weights
default
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2011103885840A
Other languages
Chinese (zh)
Other versions
CN103136475B (en
Inventor
姚纪卫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201110388584.0A priority Critical patent/CN103136475B/en
Publication of CN103136475A publication Critical patent/CN103136475A/en
Application granted granted Critical
Publication of CN103136475B publication Critical patent/CN103136475B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Debugging And Monitoring (AREA)

Abstract

The invention provides a method and a device for detecting computer viruses. The method and the device for detecting the computer viruses are used for solving the problem of low efficiency of detecting the computer viruses in the prior art. The method comprises a first step of counting the number of operating system application programmers interfaces (API) belonging to preset API aggregation from a plurality of operating system APIs called by a detected program, and a second step of outputting a prompt message for promoting that the detected program includes the computer viruses when the number is larger than a preset value. According to the technical scheme, high-efficient detection of the computer viruses is benefited.

Description

A kind of method and apparatus that checks computer virus
Technical field
The present invention relates to field of computer technology, relate to especially a kind of method and apparatus that checks computer virus.
Background technology
Along with the development of computer technology, computer virus is also in the data security that day by day affects the computer user or experience.A lot of computing machines have been installed antivirus software (or claiming antivirus software, fire wall etc.) with the opposing computer virus for this reason.Antivirus software adopts the mode of condition code identification to check virus more at present, confirms to comprise virus in the file of current scanning by checking viral condition code, and this mode checks that the efficient of virus is lower.
In prior art, check that the efficient of computer virus is lower, for this problem, not yet propose at present effective solution.
Summary of the invention
Fundamental purpose of the present invention is to provide a kind of method and apparatus that checks file, to solve the lower problem of efficient that checks computer virus in prior art.
To achieve these goals, according to an aspect of the present invention, provide a kind of method that checks computer virus.
The method of inspection computer virus of the present invention is used for determining whether tested program comprises computer virus, the method comprises: in a plurality of operating system application programming interfaces (API) that the statistics tested program is called, belong to the quantity of the operating system API of default API set; Time output is used for the information that the prompting tested program comprises computer virus greater than preset value when described quantity.
Further, in a plurality of operating system application programming interfaces (API) that the statistics tested program is called, the quantity that belongs to the operating system API of default API set, comprise: constructing system API table, each list item of described system API table comprises the weights that operating system API is corresponding, weights corresponding to operating system API that wherein belong to described default API set are 1, otherwise corresponding weights are 0; Weights corresponding to operating system API that called by described tested program in cumulative described system API table, with accumulated value as described quantity.
Further, in a plurality of operating system application programming interfaces (API) that the statistics tested program is called, the quantity that belongs to the operating system API of default API set, comprise: constructing system API table, each list item of described system API table comprises the weights that operating system API is corresponding, wherein, weights corresponding to operating system API that belong to described default API set are 1, otherwise corresponding weights are 0; Weights corresponding to operating system API that called by described tested program in cumulative described system API table, and, count 1 with operating system API in the default subset of the described default API set corresponding weights of invoked operating system API in the lump, with accumulated value as described quantity.
According to a further aspect in the invention, provide a kind of device that checks computer virus.
The device of inspection computer virus of the present invention is used for determining whether tested program comprises computer virus, this device comprises: statistical module, be used for a plurality of operating system application programming interfaces (API) that the statistics tested program is called, belong to the quantity of the operating system API of default API set; The judgement output module is used for judging according to described quantity, if described quantity during greater than preset value output be used for pointing out described tested program to comprise the information of computer virus.
Further, described statistical module also is used for: constructing system API table, each list item of described system API table comprises the weights that operating system API is corresponding, and weights corresponding to operating system API that wherein belong to described default API set are 1, otherwise corresponding weights are 0; Weights corresponding to operating system API that called by described tested program in cumulative described system API table, with accumulated value as described quantity.
Further, described statistical module also is used for: constructing system API table, and each list item of described system API table comprises the weights that operating system API is corresponding, wherein, weights corresponding to operating system API that belong to described default API set are 1, otherwise corresponding weights are 0; Weights corresponding to operating system API that called by described tested program in cumulative described system API table, and, count 1 with operating system API in the default subset of the described default API set corresponding weights of invoked operating system API in the lump, with accumulated value as described quantity.
According to technical scheme of the present invention, check the method for computer virus according to the situation of being called of operating system API, if program too much when (greater than preset value), determines that this program comprises computer virus for the call number of specific operating system API (namely belong to default API set).This method need not to relate to a large amount of calculating in the coupling of condition code, and treatment effeciency is higher; And because thereby virus can't be avoided calling for operating system API for normal operation, so therefore the various means of inspection of evading of computer virus adopt the method for the present embodiment also to help effectively to check out computer virus to the method inefficacy of the present embodiment.
Description of drawings
Figure of description is used to provide a further understanding of the present invention, consists of the application's a part, and illustrative examples of the present invention and explanation thereof are used for explaining the present invention, do not consist of improper restriction of the present invention.In the accompanying drawings:
Fig. 1 is the schematic diagram according to the basic step of the method for the inspection computer virus of the embodiment of the present invention;
Fig. 2 is the basic structure schematic diagram according to the device of the inspection computer virus of the embodiment of the present invention.
Embodiment
Need to prove, in the situation that do not conflict, embodiment and the feature in embodiment in the application can make up mutually.Describe below with reference to the accompanying drawings and in conjunction with the embodiments the present invention in detail.
The method of the inspection computer virus of the embodiment of the present invention is carried out by antivirus software, can be undertaken by step shown in Figure 1.Fig. 1 is the schematic diagram according to the basic step of the method for the inspection computer virus of the embodiment of the present invention.As shown in Figure 1, the method for the inspection computer virus of the embodiment of the present invention mainly comprises the steps:
Step S11: in a plurality of operating system application programming interfaces (API) that the statistics tested program is called, belong to the quantity of the operating system API of default API set.
Step S12: time output is used for the information that the prompting tested program comprises computer virus greater than preset value when described quantity.
Below be described further for above-mentioned steps.
Computer virus is in order to reach its oneself purpose, for example destroy or steal the data in computing machine, can use some specific system API, and use more multiple this class particular system API toward the contact meeting, and some normal programs are because the function completed obviously is different from viral wooden horse, therefore can be lower to the frequency of this class specific system API Calls.Above-mentioned " the specific API of system " be which API specifically, can determine by summary of experience, for example can for a plurality of known be virus program and do not contain virus program, add up respectively the kind of the API that they call, find out rule with this, and determine above-mentioned " the specific API of system " and these API that are preset as in step S11 are gathered.
Above-mentioned known when being the API that calls of program of virus or API that the tested program in step S11, S22 is called in statistics, can carry out in the simulated environment that builds, in order to avoid destruction of computer systems.Can adopt the anti-virus virtual machine of using at present a lot of antivirus softwares, program can inside be moved for simulation certain operations system performance, then just can monitor and add up its API Calls situation.
Particularly, can show by first constructing system API, each list item of the API of this system table comprises the weights that operating system API is corresponding, and weights corresponding to operating system API that wherein belong to above-mentioned default API set are 1, otherwise corresponding weights are 0.Then, weights corresponding to operating system API that called by tested program in the cumulative API of this system table, with accumulated value as the quantity in step S11.
Also can there be characteristics in Virus for calling of the API of system, can call synergistically two API exactly.Namely for some API, non-viral program can be called separately it, and Virus can call it before or after calling another specific API.So the statistics in step S11 can be considered this characteristics.
Can be specifically, except constructing system API table, and weights corresponding to operating system API that called by tested program in Accumulation System API table, and, count 1 with operating system API in the default subset of the default API set corresponding weights of invoked operating system API in the lump, with accumulated value as the quantity in step S11.Operating system API in the default subset here is above-mentioned specific API, and specifically which API can rule of thumb determine.
Below explain for the device of the inspection computer virus in the present embodiment.Fig. 2 is the basic structure schematic diagram according to the device of the inspection computer virus of the embodiment of the present invention.
As shown in Figure 2, the device 20 of the inspection computer virus in the embodiment of the present invention is used for determining whether tested program comprises computer virus, mainly comprise as lower module: statistical module 21, be used for a plurality of operating system application programming interfaces (API) that the statistics tested program is called, belong to the quantity of the operating system API of default API set; Judgement output module 22 is used for judging according to described quantity, if described quantity during greater than preset value output be used for pointing out described tested program to comprise the information of computer virus.
Statistical module 21 also can be used for: constructing system API table, and each list item of described system API table comprises the weights that operating system API is corresponding, and weights corresponding to operating system API that wherein belong to described default API set are 1, on the contrary corresponding weights are 0; Weights corresponding to operating system API that called by described tested program in cumulative described system API table, with accumulated value as described quantity.
Statistical module 21 also can be used for: constructing system API table, and each list item of described system API table comprises the weights that operating system API is corresponding, and wherein, weights corresponding to operating system API that belong to described default API set are 1, on the contrary corresponding weights are 0; Weights corresponding to operating system API that called by described tested program in cumulative described system API table, and, count 1 with operating system API in the default subset of the described default API set corresponding weights of invoked operating system API in the lump, with accumulated value as described quantity.
The present embodiment provides a kind of situation of being called according to operating system API to check the method for computer virus.This method need not to relate to a large amount of calculating in the coupling of condition code, and treatment effeciency is higher; And because thereby virus can't be avoided calling for operating system API for normal operation, so therefore the various means of inspection of evading of computer virus adopt the method for the present embodiment also to help effectively to check out computer virus to the method inefficacy of the present embodiment.
obviously, those skilled in the art should be understood that, above-mentioned each module of the present invention or each step can realize with general calculation element, they can concentrate on single calculation element, perhaps be distributed on the network that a plurality of calculation elements form, alternatively, they can be realized with the executable program code of calculation element, thereby, they can be stored in memory storage and be carried out by calculation element, perhaps they are made into respectively each integrated circuit modules, perhaps a plurality of modules in them or step being made into the single integrated circuit module realizes.Like this, the present invention is not restricted to any specific hardware and software combination.
The above is only the preferred embodiments of the present invention, is not limited to the present invention, and for a person skilled in the art, the present invention can have various modifications and variations.Within the spirit and principles in the present invention all, any modification of doing, be equal to replacement, improvement etc., within all should being included in protection scope of the present invention.

Claims (6)

1. a method that checks computer virus, be used for definite tested program and whether comprise computer virus, it is characterized in that, described method comprises:
In a plurality of operating system application programming interfaces (API) that the statistics tested program is called, belong to the quantity of the operating system API of default API set;
Time output is used for pointing out described tested program to comprise the information of computer virus greater than preset value when described quantity.
2. method according to claim 1, is characterized in that, in a plurality of operating system application programming interfaces (API) that the statistics tested program is called, belongs to the quantity of the operating system API of default API set, comprising:
Constructing system API table, each list item of described system API table comprises the weights that operating system API is corresponding, and weights corresponding to operating system API that wherein belong to described default API set are 1, on the contrary corresponding weights are 0;
Weights corresponding to operating system API that called by described tested program in cumulative described system API table, with accumulated value as described quantity.
3. method according to claim 1, is characterized in that, in a plurality of operating system application programming interfaces (API) that the statistics tested program is called, belongs to the quantity of the operating system API of default API set, comprising:
Constructing system API table, each list item of described system API table comprises the weights that operating system API is corresponding, and wherein, weights corresponding to operating system API that belong to described default API set are 1, on the contrary corresponding weights are 0;
Weights corresponding to operating system API that called by described tested program in cumulative described system API table, and, count 1 with operating system API in the default subset of the described default API set corresponding weights of invoked operating system API in the lump, with accumulated value as described quantity.
4. a device that checks computer virus, be used for definite tested program and whether comprise computer virus, it is characterized in that, described device comprises:
Statistical module is used for a plurality of operating system application programming interfaces (API) that the statistics tested program is called, and belongs to the quantity of the operating system API of default API set;
The judgement output module is used for judging according to described quantity, if described quantity during greater than preset value output be used for pointing out described tested program to comprise the information of computer virus.
5. device according to claim 4, is characterized in that, described statistical module also is used for:
Constructing system API table, each list item of described system API table comprises the weights that operating system API is corresponding, and weights corresponding to operating system API that wherein belong to described default API set are 1, on the contrary corresponding weights are 0;
Weights corresponding to operating system API that called by described tested program in cumulative described system API table, with accumulated value as described quantity.
6. device according to claim 4, is characterized in that, described statistical module also is used for:
Constructing system API table, each list item of described system API table comprises the weights that operating system API is corresponding, and wherein, weights corresponding to operating system API that belong to described default API set are 1, on the contrary corresponding weights are 0;
Weights corresponding to operating system API that called by described tested program in cumulative described system API table, and, count 1 with operating system API in the default subset of the described default API set corresponding weights of invoked operating system API in the lump, with accumulated value as described quantity.
CN201110388584.0A 2011-11-29 2011-11-29 A kind of method and apparatus for checking computer virus Active CN103136475B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110388584.0A CN103136475B (en) 2011-11-29 2011-11-29 A kind of method and apparatus for checking computer virus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110388584.0A CN103136475B (en) 2011-11-29 2011-11-29 A kind of method and apparatus for checking computer virus

Publications (2)

Publication Number Publication Date
CN103136475A true CN103136475A (en) 2013-06-05
CN103136475B CN103136475B (en) 2017-07-04

Family

ID=48496292

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110388584.0A Active CN103136475B (en) 2011-11-29 2011-11-29 A kind of method and apparatus for checking computer virus

Country Status (1)

Country Link
CN (1) CN103136475B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104252594A (en) * 2013-06-27 2014-12-31 贝壳网际(北京)安全技术有限公司 Virus detection method and device
CN106803040A (en) * 2017-01-18 2017-06-06 腾讯科技(深圳)有限公司 Virus signature processing method and processing device
CN107315957A (en) * 2017-06-22 2017-11-03 宇龙计算机通信科技(深圳)有限公司 The control method and device of camera

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1801030A (en) * 2004-12-31 2006-07-12 福建东方微点信息安全有限责任公司 Method for distinguishing baleful program behavior
CN1818823A (en) * 2005-02-07 2006-08-16 福建东方微点信息安全有限责任公司 Computer protecting method based on programm behaviour analysis
CN101013461A (en) * 2007-02-14 2007-08-08 白杰 Method of computer protection based on program behavior analysis
JP2010009296A (en) * 2008-06-26 2010-01-14 Fujitsu Ltd Software operation monitoring device and method
CN102034050A (en) * 2011-01-25 2011-04-27 四川大学 Dynamic malicious software detection method based on virtual machine and sensitive Native application programming interface (API) calling perception

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1801030A (en) * 2004-12-31 2006-07-12 福建东方微点信息安全有限责任公司 Method for distinguishing baleful program behavior
CN1818823A (en) * 2005-02-07 2006-08-16 福建东方微点信息安全有限责任公司 Computer protecting method based on programm behaviour analysis
CN101013461A (en) * 2007-02-14 2007-08-08 白杰 Method of computer protection based on program behavior analysis
JP2010009296A (en) * 2008-06-26 2010-01-14 Fujitsu Ltd Software operation monitoring device and method
CN102034050A (en) * 2011-01-25 2011-04-27 四川大学 Dynamic malicious software detection method based on virtual machine and sensitive Native application programming interface (API) calling perception

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104252594A (en) * 2013-06-27 2014-12-31 贝壳网际(北京)安全技术有限公司 Virus detection method and device
CN106803040A (en) * 2017-01-18 2017-06-06 腾讯科技(深圳)有限公司 Virus signature processing method and processing device
CN106803040B (en) * 2017-01-18 2021-08-10 腾讯科技(深圳)有限公司 Virus characteristic code processing method and device
CN107315957A (en) * 2017-06-22 2017-11-03 宇龙计算机通信科技(深圳)有限公司 The control method and device of camera

Also Published As

Publication number Publication date
CN103136475B (en) 2017-07-04

Similar Documents

Publication Publication Date Title
KR102469267B1 (en) Blockchain consensus method, accounting node and node
US9465941B2 (en) Method, system, and apparatus for detecting malicious code
CN106557697B (en) System and method for generating a set of disinfection records
US8220054B1 (en) Process exception list updating in a malware behavior monitoring program
Wang et al. Malicious firmware detection with hardware performance counters
KR101899589B1 (en) System and method for authentication about safety software
US20210014251A1 (en) Systems and methods for protecting devices from malware
US20160021131A1 (en) Identifying stealth packets in network communications through use of packet headers
Ho et al. PREC: practical root exploit containment for android devices
CN104392175A (en) System and method and device for processing cloud application attack behaviors in cloud computing system
CN104536776B (en) A kind of method and apparatus running plug-in application in the plug-in component operation environment of host end
CN105844146B (en) Method and device for protecting driver and electronic equipment
EP3270319A1 (en) Method and apparatus for generating dynamic security module
CN102609654A (en) Method and device for detecting malicious flash files
CN106326737A (en) System and method for detecting harmful files executable on a virtual stack machine
WO2020019485A1 (en) Simulator identification method, identification device, and computer readable medium
CN104462962A (en) Method for detecting unknown malicious codes and binary bugs
CN103136475A (en) Method and device for detecting computer viruses
CN104992116B (en) Monitoring method based on intent sniffer and system
KR101324691B1 (en) System and method for detecting malicious mobile applications
CN105528546B (en) Vulnerability mining method and device and electronic equipment
CN112383513B (en) Crawler behavior detection method and device based on proxy IP address pool and storage medium
Karim et al. Opening Pandora's box through ATFuzzer: dynamic analysis of AT interface for Android smartphones
JP2013109553A (en) Program white list distribution device and method
CN103679024B (en) Virus treating method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant