CN104252594B - 病毒检测方法和装置 - Google Patents
病毒检测方法和装置 Download PDFInfo
- Publication number
- CN104252594B CN104252594B CN201310263922.7A CN201310263922A CN104252594B CN 104252594 B CN104252594 B CN 104252594B CN 201310263922 A CN201310263922 A CN 201310263922A CN 104252594 B CN104252594 B CN 104252594B
- Authority
- CN
- China
- Prior art keywords
- function
- calling
- virus
- sequence
- called
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/033—Test or assess software
Abstract
Description
Claims (12)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310263922.7A CN104252594B (zh) | 2013-06-27 | 2013-06-27 | 病毒检测方法和装置 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310263922.7A CN104252594B (zh) | 2013-06-27 | 2013-06-27 | 病毒检测方法和装置 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104252594A CN104252594A (zh) | 2014-12-31 |
CN104252594B true CN104252594B (zh) | 2019-04-02 |
Family
ID=52187480
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310263922.7A Active CN104252594B (zh) | 2013-06-27 | 2013-06-27 | 病毒检测方法和装置 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104252594B (zh) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105095754A (zh) * | 2015-05-11 | 2015-11-25 | 北京奇虎科技有限公司 | 一种处理病毒应用的方法、和装置和移动终端 |
CN106709335B (zh) * | 2015-11-17 | 2020-12-04 | 阿里巴巴集团控股有限公司 | 漏洞检测方法和装置 |
CN105893845B (zh) * | 2016-04-05 | 2019-05-10 | 珠海豹趣科技有限公司 | 一种数据处理方法及装置 |
CN106169044B (zh) * | 2016-06-29 | 2019-12-10 | 珠海豹趣科技有限公司 | 一种保护线程数据的方法、装置及电子设备 |
CN109472135B (zh) * | 2017-12-29 | 2022-02-22 | 北京安天网络安全技术有限公司 | 一种检测进程注入的方法、装置及存储介质 |
CN110866248B (zh) * | 2018-11-28 | 2022-06-10 | 北京安天网络安全技术有限公司 | 一种勒索病毒识别方法、装置、电子设备及存储介质 |
CN111597101B (zh) * | 2019-02-21 | 2023-09-08 | 上海哔哩哔哩科技有限公司 | Sdk接入状态检测方法、计算机设备及计算机可读存储介质 |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100504903C (zh) * | 2007-09-18 | 2009-06-24 | 北京大学 | 一种恶意代码自动识别方法 |
JP2010009269A (ja) * | 2008-06-26 | 2010-01-14 | Iwate Univ | コンピュータウィルス検出装置、コンピュータウィルス検出方法及びコンピュータウィルス検出プログラム |
CN102314561B (zh) * | 2010-07-01 | 2014-07-23 | 电子科技大学 | 基于api hook的恶意代码自动分析方法和系统 |
CN102034042B (zh) * | 2010-12-13 | 2012-10-03 | 四川大学 | 基于函数调用关系图特征的恶意代码检测新方法 |
CN103136471B (zh) * | 2011-11-25 | 2015-12-16 | 中国科学院软件研究所 | 一种恶意Android应用程序检测方法和系统 |
CN103136475B (zh) * | 2011-11-29 | 2017-07-04 | 姚纪卫 | 一种检查计算机病毒的方法和装置 |
CN102930210B (zh) * | 2012-10-14 | 2015-11-25 | 江苏金陵科技集团有限公司 | 恶意程序行为自动化分析、检测与分类系统及方法 |
-
2013
- 2013-06-27 CN CN201310263922.7A patent/CN104252594B/zh active Active
Also Published As
Publication number | Publication date |
---|---|
CN104252594A (zh) | 2014-12-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104252594B (zh) | 病毒检测方法和装置 | |
Xu et al. | Iccdetector: Icc-based malware detection on android | |
US10534906B1 (en) | Detection efficacy of virtual machine-based analysis with application specific events | |
Zhauniarovich et al. | Stadyna: Addressing the problem of dynamic code updates in the security analysis of android applications | |
Spreitzenbarth et al. | Mobile-sandbox: having a deeper look into android applications | |
US11363061B2 (en) | Runtime detection of injection attacks on web applications via static and dynamic analysis | |
US20190180036A1 (en) | Deterministic method for detecting and blocking of exploits on interpreted code | |
US10581879B1 (en) | Enhanced malware detection for generated objects | |
US11012449B2 (en) | Methods and cloud-based systems for detecting malwares by servers | |
Sikorski et al. | Practical malware analysis: the hands-on guide to dissecting malicious software | |
Bläsing et al. | An android application sandbox system for suspicious software detection | |
CN103559446B (zh) | 一种基于安卓系统的设备的动态病毒检测方法和装置 | |
JP6700351B2 (ja) | プロセスのアドレス空間内の悪意のあるコードの検出のためのシステムおよび方法 | |
CN106557701B (zh) | 基于虚拟机的内核漏洞检测方法及装置 | |
Somarriba et al. | Detection and visualization of android malware behavior | |
US10917435B2 (en) | Cloud AI engine for malware analysis and attack prediction | |
WO2019133637A1 (en) | Detection of exploitative program code | |
Hahn et al. | Robust static analysis of portable executable malware | |
Druffel et al. | Davinci: Android app analysis beyond frida via dynamic system call instrumentation | |
JP5613000B2 (ja) | アプリケーション特性解析装置およびプログラム | |
Choi et al. | Large-scale analysis of remote code injection attacks in android apps | |
Reeves | Autoscopy Jr.: Intrusion detection for embedded control systems | |
Thomas | Backdoor detection systems for embedded devices | |
KR101053470B1 (ko) | 유해 트래픽 제어 및 해킹을 차단하는 장치 및 방법 | |
Lin et al. | Mobile malware detection in sandbox with live event feeding and log pattern analysis |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CP01 | Change in the name or title of a patent holder |
Address after: 100022 the 12 level of Fuxing International Center, 237 Chaoyang North Road, Chaoyang District, Beijing. Patentee after: Beijing Cheetah Mobile Technology Co.,Ltd. Patentee after: Beijing Cheetah Network Technology Co.,Ltd. Patentee after: BEIJING KINGSOFT INTERNET SECURITY SOFTWARE Co.,Ltd. Patentee after: ZHUHAI JUNTIAN ELECTRONIC TECHNOLOGY Co.,Ltd. Patentee after: CONEW NETWORK TECHNOLOGY (BEIJING) Co.,Ltd. Address before: 100022 the 12 level of Fuxing International Center, 237 Chaoyang North Road, Chaoyang District, Beijing. Patentee before: SHELL INTERNET (BEIJING) SECURITY TECHNOLOGY Co.,Ltd. Patentee before: BEIJING KINGSOFT NETWORK TECHNOLOGY Co.,Ltd. Patentee before: BEIJING KINGSOFT INTERNET SECURITY SOFTWARE Co.,Ltd. Patentee before: ZHUHAI JUNTIAN ELECTRONIC TECHNOLOGY Co.,Ltd. Patentee before: CONEW NETWORK TECHNOLOGY (BEIJING) Co.,Ltd. |
|
CP01 | Change in the name or title of a patent holder |