CN104462962A - 一种检测未知恶意代码和二进制漏洞的方法 - Google Patents
一种检测未知恶意代码和二进制漏洞的方法 Download PDFInfo
- Publication number
- CN104462962A CN104462962A CN201310415916.9A CN201310415916A CN104462962A CN 104462962 A CN104462962 A CN 104462962A CN 201310415916 A CN201310415916 A CN 201310415916A CN 104462962 A CN104462962 A CN 104462962A
- Authority
- CN
- China
- Prior art keywords
- code
- sandbox
- program
- malicious code
- unknown malicious
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Virology (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Debugging And Monitoring (AREA)
Abstract
Description
Claims (4)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310415916.9A CN104462962B (zh) | 2013-09-13 | 2013-09-13 | 一种检测未知恶意代码和二进制漏洞的方法 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310415916.9A CN104462962B (zh) | 2013-09-13 | 2013-09-13 | 一种检测未知恶意代码和二进制漏洞的方法 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104462962A true CN104462962A (zh) | 2015-03-25 |
CN104462962B CN104462962B (zh) | 2018-07-03 |
Family
ID=52908987
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310415916.9A Active CN104462962B (zh) | 2013-09-13 | 2013-09-13 | 一种检测未知恶意代码和二进制漏洞的方法 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104462962B (zh) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105590058A (zh) * | 2015-12-18 | 2016-05-18 | 北京奇虎科技有限公司 | 虚拟机逃逸的检测方法及装置 |
CN107172035A (zh) * | 2017-05-11 | 2017-09-15 | 北京安赛创想科技有限公司 | 网络攻击信息的检测方法及装置 |
US9785778B2 (en) | 2013-12-03 | 2017-10-10 | Microsoft Technology Licensing, Llc | Directed execution of dynamic programs in isolated environments |
CN107408053A (zh) * | 2015-04-10 | 2017-11-28 | 谷歌公司 | 到本原客户端的二进制翻译 |
WO2018129916A1 (zh) * | 2017-01-16 | 2018-07-19 | 华为技术有限公司 | 沙箱检测的方法、沙箱系统和沙箱设备 |
CN108334773A (zh) * | 2017-09-11 | 2018-07-27 | 北京安天网络安全技术有限公司 | 一种执行文件检测行为的不同分支的方法和装置 |
CN108875361A (zh) * | 2017-12-28 | 2018-11-23 | 北京安天网络安全技术有限公司 | 一种监控程序的方法、装置、电子设备及存储介质 |
CN110502892A (zh) * | 2019-07-09 | 2019-11-26 | 成都亚信网络安全产业技术研究院有限公司 | 一种异常测试进程的确定方法、装置及系统 |
CN113672917A (zh) * | 2021-08-04 | 2021-11-19 | 安天科技集团股份有限公司 | 恶意代码检测方法、装置、存储介质及电子设备 |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1925494A (zh) * | 2006-09-28 | 2007-03-07 | 北京理工大学 | 一种基于行为特征的网页木马检测方法 |
US20070240215A1 (en) * | 2006-03-28 | 2007-10-11 | Blue Coat Systems, Inc. | Method and system for tracking access to application data and preventing data exploitation by malicious programs |
CN101154258A (zh) * | 2007-08-14 | 2008-04-02 | 电子科技大学 | 恶意程序动态行为自动化分析系统与方法 |
US7886272B1 (en) * | 2006-03-16 | 2011-02-08 | Avaya Inc. | Prioritize code for testing to improve code coverage of complex software |
CN102012988A (zh) * | 2010-12-02 | 2011-04-13 | 张平 | 自动二进制恶意代码行为分析方法 |
CN102254111A (zh) * | 2010-05-17 | 2011-11-23 | 北京知道创宇信息技术有限公司 | 恶意网站检测方法及装置 |
CN102339371A (zh) * | 2011-09-14 | 2012-02-01 | 奇智软件(北京)有限公司 | 一种检测恶意程序的方法、装置及虚拟机 |
CN102693396A (zh) * | 2012-06-11 | 2012-09-26 | 中南大学 | 一种基于虚拟执行模式的Flash漏洞检测方法 |
-
2013
- 2013-09-13 CN CN201310415916.9A patent/CN104462962B/zh active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7886272B1 (en) * | 2006-03-16 | 2011-02-08 | Avaya Inc. | Prioritize code for testing to improve code coverage of complex software |
US20070240215A1 (en) * | 2006-03-28 | 2007-10-11 | Blue Coat Systems, Inc. | Method and system for tracking access to application data and preventing data exploitation by malicious programs |
CN1925494A (zh) * | 2006-09-28 | 2007-03-07 | 北京理工大学 | 一种基于行为特征的网页木马检测方法 |
CN101154258A (zh) * | 2007-08-14 | 2008-04-02 | 电子科技大学 | 恶意程序动态行为自动化分析系统与方法 |
CN102254111A (zh) * | 2010-05-17 | 2011-11-23 | 北京知道创宇信息技术有限公司 | 恶意网站检测方法及装置 |
CN102012988A (zh) * | 2010-12-02 | 2011-04-13 | 张平 | 自动二进制恶意代码行为分析方法 |
CN102339371A (zh) * | 2011-09-14 | 2012-02-01 | 奇智软件(北京)有限公司 | 一种检测恶意程序的方法、装置及虚拟机 |
CN102693396A (zh) * | 2012-06-11 | 2012-09-26 | 中南大学 | 一种基于虚拟执行模式的Flash漏洞检测方法 |
Non-Patent Citations (1)
Title |
---|
张永超: ""基于虚拟执行技术的恶意程序检测系统研究与实现"", 《中国优秀硕士学位论文全文数据库 信息科技辑》 * |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9785778B2 (en) | 2013-12-03 | 2017-10-10 | Microsoft Technology Licensing, Llc | Directed execution of dynamic programs in isolated environments |
CN107408053A (zh) * | 2015-04-10 | 2017-11-28 | 谷歌公司 | 到本原客户端的二进制翻译 |
CN107408053B (zh) * | 2015-04-10 | 2021-04-16 | 谷歌有限责任公司 | 用于到本原客户端的二进制翻译的方法、系统和介质 |
CN105590058A (zh) * | 2015-12-18 | 2016-05-18 | 北京奇虎科技有限公司 | 虚拟机逃逸的检测方法及装置 |
WO2018129916A1 (zh) * | 2017-01-16 | 2018-07-19 | 华为技术有限公司 | 沙箱检测的方法、沙箱系统和沙箱设备 |
CN107172035A (zh) * | 2017-05-11 | 2017-09-15 | 北京安赛创想科技有限公司 | 网络攻击信息的检测方法及装置 |
CN108334773A (zh) * | 2017-09-11 | 2018-07-27 | 北京安天网络安全技术有限公司 | 一种执行文件检测行为的不同分支的方法和装置 |
CN108875361A (zh) * | 2017-12-28 | 2018-11-23 | 北京安天网络安全技术有限公司 | 一种监控程序的方法、装置、电子设备及存储介质 |
CN110502892A (zh) * | 2019-07-09 | 2019-11-26 | 成都亚信网络安全产业技术研究院有限公司 | 一种异常测试进程的确定方法、装置及系统 |
CN113672917A (zh) * | 2021-08-04 | 2021-11-19 | 安天科技集团股份有限公司 | 恶意代码检测方法、装置、存储介质及电子设备 |
Also Published As
Publication number | Publication date |
---|---|
CN104462962B (zh) | 2018-07-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104462962A (zh) | 一种检测未知恶意代码和二进制漏洞的方法 | |
KR102306568B1 (ko) | 컴퓨터 시스템의 제어 흐름 무결성의 프로세서 트레이스 기반 집행 | |
Liu et al. | Behavior-based malware analysis and detection | |
Carmony et al. | Extract Me If You Can: Abusing PDF Parsers in Malware Detectors. | |
US9405899B2 (en) | Software protection mechanism | |
US10055585B2 (en) | Hardware and software execution profiling | |
US20170054754A1 (en) | Malware and exploit campaign detection system and method | |
EP3232359B1 (en) | Identification device, identification method, and identification program | |
CN102043915B (zh) | 一种非可执行文件中包含恶意代码的检测方法及其装置 | |
CN107408176A (zh) | 恶意对象的执行剖析检测 | |
CN106611122A (zh) | 基于虚拟执行的未知恶意程序离线检测系统 | |
KR101972825B1 (ko) | 하이브리드 분석 기술을 이용한 임베디드 기기 취약점 자동 분석 방법, 장치 및 그 방법을 실행하는 컴퓨터 프로그램 | |
Zhu et al. | FIoT: Detecting the memory corruption in lightweight IoT device firmware | |
Dai et al. | Behavior-based malware detection on mobile phone | |
CN105678164A (zh) | 检测恶意软件的方法及装置 | |
CN102624721B (zh) | 一种特征码验证平台装置及特征码验证方法 | |
CN113572726A (zh) | 一种多模态网络控制-数据平面一致性校验方法及装置 | |
Gržinić et al. | Methods for automatic malware analysis and classification: a survey | |
He et al. | Toward hybrid static-dynamic detection of vulnerabilities in IoT firmware | |
CN115001789A (zh) | 一种失陷设备检测方法、装置、设备及介质 | |
CN107122664B (zh) | 安全防护方法及装置 | |
Ding et al. | Accurate and efficient exploit capture and classification | |
CN105025067A (zh) | 一种信息安全技术研究平台 | |
Jia et al. | Defending return‐oriented programming based on virtualization techniques | |
CN104331364A (zh) | 一种移动平台应用软件的检测方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
PE01 | Entry into force of the registration of the contract for pledge of patent right |
Denomination of invention: A method of detecting binary vulnerabilities and unknown code Effective date of registration: 20201204 Granted publication date: 20180703 Pledgee: Beijing ustron Tongsheng financing Company limited by guarantee Pledgor: BEIJING AISEC CREATED TECHNOLOGY Co.,Ltd. Registration number: Y2020990001420 |
|
PE01 | Entry into force of the registration of the contract for pledge of patent right | ||
PC01 | Cancellation of the registration of the contract for pledge of patent right |
Date of cancellation: 20230313 Granted publication date: 20180703 Pledgee: Beijing ustron Tongsheng financing Company limited by guarantee Pledgor: BEIJING AISEC CREATED TECHNOLOGY CO.,LTD. Registration number: Y2020990001420 |
|
PC01 | Cancellation of the registration of the contract for pledge of patent right |