CN104573511B - The method and system of caryogram virus in a kind of killing - Google Patents

The method and system of caryogram virus in a kind of killing Download PDF

Info

Publication number
CN104573511B
CN104573511B CN201310481967.1A CN201310481967A CN104573511B CN 104573511 B CN104573511 B CN 104573511B CN 201310481967 A CN201310481967 A CN 201310481967A CN 104573511 B CN104573511 B CN 104573511B
Authority
CN
China
Prior art keywords
virus
caryogram
interior
cleaning scheme
starting
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310481967.1A
Other languages
Chinese (zh)
Other versions
CN104573511A (en
Inventor
宁晓魁
陈实
李俊
陈军
郭卫先
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CN201310481967.1A priority Critical patent/CN104573511B/en
Publication of CN104573511A publication Critical patent/CN104573511A/en
Application granted granted Critical
Publication of CN104573511B publication Critical patent/CN104573511B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/568Computer malware detection or handling, e.g. anti-virus arrangements eliminating virus, restoring damaged files

Abstract

The present invention discloses the method and electronic equipment of caryogram virus in a kind of killing.Methods described includes:Before os starting, the cleaning scheme of the interior caryogram virus is obtained by the basic input output system with Extensible Firmware Interface;The cleaning scheme includes the storage address of the interior caryogram virus;The position of the interior caryogram virus is determined according to the storage address;Remove the data of the position storage.Using the method or electronic equipment of the present invention, Rootkit viruses can be purged before Rootkit viruses are linked into system kernel in a manner of driver, so as to increase the security of operating system.

Description

The method and system of caryogram virus in a kind of killing
Technical field
The present invention relates to computer safety field, more particularly to a kind of method and system of caryogram virus in killing.
Background technology
With the continuous development of network technology, the safety problem of the operating system of electronic equipment becomes more and more important.Mesh Before, for the security threat of the operating system of electronic equipment it is maximum be still various types of Viruses.
Inside many Virus Types, it is exactly interior caryogram most to allow people disgustful(Rootkit)Virus.Killed when many Malicious software can detect the virus, but can not effectively remove.The characteristics of this viroid, is, before antivirus software startup, this Viroid can be linked into system kernel in a manner of driver, then can establish secret back door, replacement system normal file, Process hiding, monitoring network, record keystroke sequence, some Rootkit viruses even can also close antivirus software.
It can be seen that checking and killing virus method of the prior art, for the virus of interior caryogram, can not effectively be removed.
The content of the invention
It is an object of the invention to provide in a kind of killing caryogram virus method and system, can Rootkit viruses with The mode of driver is linked into before system kernel, and Rootkit viruses are purged, so as to increase the safety of operating system Property.
To achieve the above object, the invention provides following scheme:
The method of caryogram virus, methods described include in a kind of killing:
Before os starting, obtained by the basic input output system with Extensible Firmware Interface in described The cleaning scheme of caryogram virus;The cleaning scheme includes the storage address of the interior caryogram virus;
The position of the interior caryogram virus is determined according to the storage address;
Remove the data of the position storage.
Optionally, after the data for removing the position storage, in addition to:
From the cleaning scheme, relevant information of the interior caryogram virus in registration table is determined;
Remove the relevant information.
Optionally, after the data for removing the position storage, in addition to:
Boot sequence of the antivirus software in os starting is arranged to the first preferential startup, to prevent interior caryogram Virus loads before antivirus software startup.
Optionally, after the os starting, methods described also includes:
Detect whether the operating system is loaded with the interior caryogram virus in real time by the antivirus software;
When detecting that the operating system is loaded with the interior caryogram virus, obtained from the server of network side in described The cleaning scheme of caryogram virus;
By the cleaning scheme write-in basic input and output system with Extensible Firmware Interface of the interior caryogram virus System, to remove the interior caryogram virus during basic input output system startup next time.
Optionally, the server from network side obtains the cleaning scheme of the interior caryogram virus, including:
The characteristic information of the interior caryogram virus is sent to the server;
Receive the cleaning scheme for the interior caryogram virus to match with the characteristic information that the server is sent.
Optionally, the cleaning scheme for obtaining the interior caryogram virus, including:
From local the first cleaning scheme for obtaining the interior caryogram virus;First cleaning scheme is the operating system Pass through the antivirus software write-in basic input output system with Extensible Firmware Interface after last time startup;
Or the second cleaning scheme of the interior caryogram virus is obtained from the server of network side.
A kind of electronic equipment, the electronic equipment include:
First cleaning scheme acquiring unit, for before os starting, by with Extensible Firmware Interface Basic input output system obtains the cleaning scheme of the interior caryogram virus;
Position determination unit, for determining the position of the interior caryogram virus according to the storage address;
Data dump unit, for removing the data of the position storage.
Optionally, in addition to:
Relevant information determining unit, for remove position storage in the data dump unit data after, from In the cleaning scheme, relevant information of the interior caryogram virus in registration table is determined;
Relevant information clearing cell, for removing the relevant information.
Optionally, in addition to:
Boot sequence setting unit, for after the data of the data dump unit removing position storage, inciting somebody to action Boot sequence of the antivirus software in os starting is arranged to the first preferential startup, to prevent interior caryogram virus described Antivirus software loads before starting.
Optionally, the electronic equipment also includes:
Virus detection element, for after the os starting, the behaviour to be detected in real time by the antivirus software Make whether system is loaded with the interior caryogram virus;
Second cleaning scheme acquiring unit, for when detecting that the operating system is loaded with the interior caryogram virus, The cleaning scheme of the interior caryogram virus is obtained from the server of network side;
Cleaning scheme writing unit, for will there is extended firmware described in the cleaning scheme write-in of the interior caryogram virus The basic input output system of interface, to remove the interior caryogram virus during basic input output system startup next time.
Optionally, the second cleaning scheme acquiring unit, including:
Characteristic information transmission sub-unit, for sending the characteristic information of the interior caryogram virus to the server;
Cleaning scheme receiving subelement, match for receiving that the server sends with the characteristic information described in The cleaning scheme of interior caryogram virus.
Optionally, the first cleaning scheme acquiring unit, including:
First cleaning scheme first obtains subelement, for obtaining the first viral removing side of the interior caryogram from local Case;First cleaning scheme is described with expansible solid by antivirus software write-in after starting the operating system last time The basic input output system of part interface;
First cleaning scheme second obtains subelement, for obtaining the interior caryogram virus from the server of network side Second cleaning scheme.
According to specific embodiment provided by the invention, the invention discloses following technique effect:
The method and electronic equipment of caryogram virus in the killing of the present invention, by with can expand before os starting The basic input output system for opening up firmware interface obtains the cleaning scheme of the interior caryogram virus;According in the cleaning scheme Storage address determines the position of the interior caryogram virus;Remove the data of the position storage;It can be driven in Rootkit viruses The mode of dynamic program is linked into before system kernel, and Rootkit viruses are purged, so as to increase the security of operating system.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to institute in embodiment The accompanying drawing needed to use is briefly described, it should be apparent that, drawings in the following description are only some implementations of the present invention Example, for those of ordinary skill in the art, without having to pay creative labor, can also be according to these accompanying drawings Obtain other accompanying drawings.
Fig. 1 is the flow chart of the embodiment of the method 1 of caryogram virus in the killing of the present invention;
Fig. 2 is the flow chart of the embodiment of the method 2 of caryogram virus in the killing of the present invention;
Fig. 3 is the flow chart of the embodiment of the method 3 of caryogram virus in the killing of the present invention;
Fig. 4 is the flow chart of the embodiment of the method 4 of caryogram virus in the killing of the present invention;
Fig. 5 is the structure chart of the electronic equipment embodiment of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, rather than whole embodiments.It is based on Embodiment in the present invention, those of ordinary skill in the art are obtained every other under the premise of creative work is not made Embodiment, belong to the scope of protection of the invention.
In order to facilitate the understanding of the purposes, features and advantages of the present invention, it is below in conjunction with the accompanying drawings and specific real Applying mode, the present invention is further detailed explanation.
The method of caryogram virus in the killing of the present invention, applied to Extensible Firmware Interface(EFI)Basic input Output system(BIOS)Electronic equipment.The electronic equipment can be the electronic equipment such as desktop computer, all-in-one.
It is well known that in the prior art, during PC starts, BIOS is responsible for initiating hardware, detects hardware work( Can, and the responsibility of guiding operating system.Bios program is deposited in the read-only storage that content after a power down will not lose, The address of first instruction of processor can be positioned in BIOS memory when system powers up, and be easy to obtain initialization program To execution.
EFI BIOS are a kind of new BIOS that latest developments are got up.EFI BIOS are to use modularization, the ginseng of C language style Number storehouse transfer modes, the system of the form structure of dynamic link, it is more easily implemented for more traditional BIOS, fault-tolerant and error correction Characteristic is stronger, can shorten the time of system research and development.It utilizes the form for loading EFI drivings, identification and operation hardware.EFI BIOS is conceptually very similar to the operating system of a low order, and with the ability of manipulation all hardware resource.
The core concept of the present invention is that just have manipulation hardware resource before os starting using EFI BIOS Ability, before os starting, interior caryogram virus is removed from the element of electronic equipment so that electronic equipment is operating During system starts, interior caryogram virus has been not present, and prevents before antivirus software starts, interior caryogram virus is operating System is linked into system kernel during starting in a manner of driver.
Fig. 1 is the flow chart of the embodiment of the method 1 of caryogram virus in the killing of the present invention.As shown in figure 1, this method can be with Including:
Step 101:Before os starting, pass through the basic input output system with Extensible Firmware Interface (EFI BIOS)Obtain the cleaning scheme of the interior caryogram virus;The cleaning scheme includes the storage of the interior caryogram virus Location;
The operating system can be windows or linux operating systems.
EFI BIOS can initialize the hardware function units of the electronic equipment before os starting;Obtain To the control of the hardware function units.
Specifically, EFI BIOS can load the driver for the network communication unit for belonging to hardware function units so that The network communication unit enables;Loading belongs to the driver of the first memory cell of hardware function units so that described the One memory cell enables;The removing viral with the interior caryogram is obtained from service terminal based on the enabled network communication unit Scheme, and be stored in first memory cell.
When the cleaning scheme of the interior caryogram virus has stored in local electronic equipment beforehand through other modes When in the first memory cell, can also directly it be obtained in first memory cell based on enabled first memory cell The cleaning scheme of the interior caryogram virus of storage.
Cleaning scheme can be stored in advance on local electronic equipment in the following ways:It can be set in the electronics During standby last startup, electronic equipment is detected by antivirus software.When detecting there is kernel on the electronic equipment During type virus, it can be downloaded by antivirus software from the server on network for the viral cleaning scheme of the interior caryogram, by institute Cleaning scheme is stated to be stored in the memory cell of electronic equipment.The server can be the service that the manufacturer of antivirus software is set Device or third-party server.
The cleaning scheme comprises at least the behavioural characteristic and storage address of the interior caryogram virus.It is special according to the behavior Sign can identify the interior caryogram virus.The position of the interior caryogram virus can be determined according to the storage address.
Step 102:The position of the interior caryogram virus is determined according to the storage address;
The storage address can represent the interior caryogram virus is located at which storage location of memory cell.Specifically, When the memory cell is hard disk, the storage address can represent the interior caryogram virus is located at which sector of hard disk.
Step 103:Remove the data of the position storage.
Because EFI BIOS have the control to hardware function units, it is possible to are performed by EFI BIOS to storage The clear operation of data on unit.Because now operating system is also not actuated, interior caryogram virus can not also load, so EFI BIOS is thoroughly at this point for the removing of interior caryogram virus.
In summary, in the present embodiment, by substantially defeated with Extensible Firmware Interface before os starting Enter the cleaning scheme that output system obtains the interior caryogram virus;Storage address in the cleaning scheme is determined in described The position of caryogram virus;Remove the data of the position storage;It can be linked into Rootkit viruses in a manner of driver and be Unite before kernel, Rootkit viruses are purged, so as to increase the security of operating system.
Fig. 2 is the flow chart of the embodiment of the method 2 of caryogram virus in the killing of the present invention.As shown in Fig. 2 this method can be with Including:
Step 201:Before os starting, obtained by the basic input output system with Extensible Firmware Interface Take the cleaning scheme of the interior caryogram virus;The cleaning scheme includes the storage address of the interior caryogram virus;
Step 202:The position of the interior caryogram virus is determined according to the storage address;
Step 203:Remove the data of the position storage.
Step 204:From the cleaning scheme, relevant information of the interior caryogram virus in registration table is determined.
Related letter of the interior caryogram virus in registration table can also be included in the present embodiment, in the cleaning scheme Breath.
Generally, virus can also write relevant information as a kind of program of specific type in the registration table of operating system. On the one hand the relevant information can cause the startup of system or the speed of service to reduce;On the other hand, when virus is not removed thoroughly When, after os starting, it is possible to the relevant information in registration table, generate Virus again.
Therefore, the relevant information is removed, may further ensure that in the present embodiment for the thorough of interior caryogram virus sweep Bottom property.
Step 205:Remove the relevant information.
Specifically, file system can be called by EFI BIOS before os starting.Call file system Afterwards, EFI BIOS can directly be purged the associative operations such as information to registry file.
Fig. 3 is the flow chart of the embodiment of the method 3 of caryogram virus in the killing of the present invention.As shown in figure 3, this method can be with Including:
Step 301:Before os starting, obtained by the basic input output system with Extensible Firmware Interface Take the cleaning scheme of the interior caryogram virus;The cleaning scheme includes the storage address of the interior caryogram virus;
Step 302:The position of the interior caryogram virus is determined according to the storage address;
Step 303:Remove the data of the position storage.
Step 304:Boot sequence of the antivirus software in os starting is arranged to the first preferential startup, to prevent Only interior caryogram virus loads before antivirus software startup.
In the present embodiment, by adjusting boot sequence of the antivirus software in os starting, by opening for antivirus software Dynamic order is arranged to the first preferential startup, can prevent other interior caryogram viruses do not removed from starting it in the antivirus software Preceding loading.
Fig. 4 is the flow chart of the embodiment of the method 4 of caryogram virus in the killing of the present invention.As shown in figure 4, this method can be with Including:
Step 401:Before os starting, obtained by the basic input output system with Extensible Firmware Interface Take the cleaning scheme of the interior caryogram virus;The cleaning scheme includes the storage address of the interior caryogram virus;
Step 402:The position of the interior caryogram virus is determined according to the storage address;
Step 403:Remove the data of the position storage.
Step 404:Boot sequence of the antivirus software in os starting is arranged to the first preferential startup, to prevent Only interior caryogram virus loads before antivirus software startup.
Step 405:Detect whether the operating system is loaded with the interior caryogram virus in real time by the antivirus software;
Because the antivirus software is first preferentially to start, therefore the antivirus software can be to the operating system Whole start-up course carries out complete monitoring, to detect whether the operating system is loaded with the interior caryogram virus.
Specifically, it can include:
Step A:Obtain the operating system on startup, the instruction that each program is sent;
Step B:The instruction is compared with the instruction that the behavioural characteristic of interior caryogram virus represents;
The behavioural characteristic of different interior caryogram virus can be different.Can be from the service for the manufacturer for providing checking and killing virus Device obtains the viral library file on interior caryogram virus.The behavior of every kind of interior caryogram virus can be included in the viral library file Characteristic information.The behavior characteristic information can represent the instruction that interior caryogram virus is operationally sent.
Step C:It is when the instruction is identical with the instruction that the behavioural characteristic represents, the program for sending the instruction is true It is set to the interior caryogram virus.
Step 406:When detecting that the operating system is loaded with the interior caryogram virus, obtained from the server of network side Take the cleaning scheme of the interior caryogram virus;
Specifically, the characteristic information of the interior caryogram virus can be sent to the server;The characteristic information can be with It is the filename of the interior caryogram virus.
Receive the cleaning scheme for the interior caryogram virus to match with the characteristic information that the server is sent.
Step 407:The cleaning scheme write-in of the interior caryogram virus is described substantially defeated with Extensible Firmware Interface Enter output system, to remove the interior caryogram virus during basic input output system startup next time.
In the present embodiment, by the startup of operating system, preferentially loading antivirus software, by antivirus software to operation The start-up course of system carries out complete monitoring, and interior caryogram virus present in electronic equipment can be detected in real time, and The cleaning scheme for interior caryogram virus can be obtained from the server of network side, so that the electronic equipment starts next time When, the interior caryogram virus can be directly removed by EFI BIOS, further improves the security of system.
It should be noted that in the killing of the present invention in each embodiment of the method for caryogram virus, described in the acquisition The cleaning scheme of interior caryogram virus, the step for, it may each comprise two ways:
From local the first cleaning scheme for obtaining the interior caryogram virus;First cleaning scheme is the operating system Pass through the antivirus software write-in basic input output system with Extensible Firmware Interface after last time startup;
Or the second cleaning scheme of the interior caryogram virus is obtained from the server of network side.
The invention also discloses a kind of electronic equipment.The electronic equipment can be desktop computer or all-in-one.Fig. 5 is this hair The structure chart of bright electronic equipment embodiment.As shown in figure 5, the electronic equipment can include:
First cleaning scheme acquiring unit 501, for before os starting, by with Extensible Firmware Interface Basic input output system obtain the cleaning scheme of the interior caryogram virus;
Position determination unit 502, for determining the position of the interior caryogram virus according to the storage address;
Data dump unit 503, for removing the data of the position storage.
In the present embodiment, pass through the basic input output system with Extensible Firmware Interface before os starting Obtain the cleaning scheme of the interior caryogram virus;Storage address in the cleaning scheme determines the interior caryogram virus Position;Remove the data of the position storage;Can Rootkit viruses be linked into a manner of driver system kernel it Before, Rootkit viruses are purged, so as to increase the security of operating system.
In practical application, the electronic equipment can also include:
Relevant information determining unit, for remove position storage in the data dump unit 503 data after, From the cleaning scheme, relevant information of the interior caryogram virus in registration table is determined;
Relevant information clearing cell, for removing the relevant information.
It can also include:
Boot sequence setting unit, for remove position storage in the data dump unit 503 data after, Boot sequence of the antivirus software in os starting is arranged to the first preferential startup, to prevent interior caryogram virus in institute State before antivirus software starts and load.
The electronic equipment can also include:
Virus detection element, for after the os starting, the behaviour to be detected in real time by the antivirus software Make whether system is loaded with the interior caryogram virus;
Second cleaning scheme acquiring unit, for when detecting that the operating system is loaded with the interior caryogram virus, The cleaning scheme of the interior caryogram virus is obtained from the server of network side;
Cleaning scheme writing unit, for will there is extended firmware described in the cleaning scheme write-in of the interior caryogram virus The basic input output system of interface, to remove the interior caryogram virus during basic input output system startup next time.
Wherein, the second cleaning scheme acquiring unit, can include:
Characteristic information transmission sub-unit, for sending the characteristic information of the interior caryogram virus to the server;
Cleaning scheme receiving subelement, match for receiving that the server sends with the characteristic information described in The cleaning scheme of interior caryogram virus.
In above-described embodiment, the first cleaning scheme acquiring unit 501, it can include:
First cleaning scheme first obtains subelement, for obtaining the first viral removing side of the interior caryogram from local Case;First cleaning scheme is described with expansible solid by antivirus software write-in after starting the operating system last time The basic input output system of part interface;
First cleaning scheme second obtains subelement, for obtaining the interior caryogram virus from the server of network side Second cleaning scheme.
Finally, it is to be noted that, herein, such as first and second or the like relational terms be used merely to by One entity or operation make a distinction with another entity or operation, and not necessarily require or imply these entities or operation Between any this actual relation or order be present.Moreover, term " comprising ", "comprising" or its any other variant meaning Covering including for nonexcludability, so that process, method, article or equipment including a series of elements not only include that A little key elements, but also the other element including being not expressly set out, or also include for this process, method, article or The intrinsic key element of equipment.In the absence of more restrictions, the key element limited by sentence "including a ...", is not arranged Except other identical element in the process including the key element, method, article or equipment being also present.
Through the above description of the embodiments, those skilled in the art can be understood that the present invention can be by Software adds the mode of required hardware platform to realize, naturally it is also possible to all implemented by hardware, but in many cases before Person is more preferably embodiment.Based on such understanding, whole that technical scheme contributes to background technology or Person part can be embodied in the form of software product, and the computer software product can be stored in storage medium, such as ROM/RAM, magnetic disc, CD etc., including some instructions are causing a computer equipment(Can be personal computer, service Device, or network equipment etc.)Perform the method described in some parts of each embodiment of the present invention or embodiment.
Each embodiment is described by the way of progressive in this specification, what each embodiment stressed be and other The difference of embodiment, between each embodiment identical similar portion mutually referring to.For electronics disclosed in embodiment For equipment, because it is corresponded to the method disclosed in Example, so description is fairly simple, related part is referring to method portion Defend oneself bright.
Specific case used herein is set forth to the principle and embodiment of the present invention, and above example is said It is bright to be only intended to help the method and its core concept for understanding the present invention;Meanwhile for those of ordinary skill in the art, foundation The thought of the present invention, in specific embodiments and applications there will be changes.In summary, this specification content is not It is interpreted as limitation of the present invention.

Claims (12)

1. a kind of method of caryogram virus in killing, it is characterised in that methods described includes:
Before os starting, the interior caryogram is obtained by the basic input output system with Extensible Firmware Interface The cleaning scheme of virus;The cleaning scheme includes the storage address of the interior caryogram virus;
The position of the interior caryogram virus is determined according to the storage address;
Remove the data of the position storage;
Wherein, the cleaning scheme for obtaining the interior caryogram virus, including:
From local the first cleaning scheme for obtaining the interior caryogram virus;First cleaning scheme is one in the operating system Pass through the antivirus software write-in basic input output system with Extensible Firmware Interface after secondary startup.
2. according to the method for claim 1, it is characterised in that after the data for removing the position storage, also wrap Include:
From the cleaning scheme, relevant information of the interior caryogram virus in registration table is determined;
Remove the relevant information.
3. according to the method for claim 1, it is characterised in that after the data for removing the position storage, also wrap Include:
Boot sequence of the antivirus software in os starting is arranged to the first preferential startup, to prevent interior caryogram virus Loaded before antivirus software startup.
4. according to the method for claim 3, it is characterised in that after the os starting, methods described also includes:
Detect whether the operating system is loaded with the interior caryogram virus in real time by the antivirus software;
When detecting that the operating system is loaded with the interior caryogram virus, the interior caryogram is obtained from the server of network side The cleaning scheme of virus;
To there is the basic input output system of Extensible Firmware Interface described in the cleaning scheme write-in of the interior caryogram virus, with Toilet removes the interior caryogram virus when stating basic input output system startup next time.
5. according to the method for claim 4, it is characterised in that the server from network side obtains the interior caryogram disease The cleaning scheme of poison, including:
The characteristic information of the interior caryogram virus is sent to the server;
Receive the cleaning scheme for the interior caryogram virus to match with the characteristic information that the server is sent.
6. according to the method described in claim any one of 1-5, it is characterised in that the removing for obtaining the interior caryogram virus Scheme, in addition to:
The second cleaning scheme of the interior caryogram virus is obtained from the server of network side.
7. a kind of electronic equipment, it is characterised in that the electronic equipment includes:
First cleaning scheme acquiring unit, for before os starting, by with the basic of Extensible Firmware Interface The cleaning scheme of caryogram virus in input-output system acquisition, the cleaning scheme include the storage of the interior caryogram virus Location;
Position determination unit, for determining the position of the interior caryogram virus according to the storage address;
Data dump unit, for removing the data of the position storage;
The first cleaning scheme acquiring unit, including:
First cleaning scheme first obtains subelement, for obtaining the first viral cleaning scheme of the interior caryogram from local;Institute It is to be connect after starting the operating system last time by the way that antivirus software write-in is described with extended firmware to state the first cleaning scheme The basic input output system of mouth.
8. electronic equipment according to claim 7, it is characterised in that also include:
Relevant information determining unit, for remove position storage in the data dump unit data after, from described In cleaning scheme, relevant information of the interior caryogram virus in registration table is determined;
Relevant information clearing cell, for removing the relevant information.
9. electronic equipment according to claim 7, it is characterised in that also include:
Boot sequence setting unit, for after the data of the data dump unit removing position storage, will kill virus Boot sequence of the software in os starting is arranged to the first preferential startup, to prevent interior caryogram virus in the antivirus Software loads before starting.
10. electronic equipment according to claim 9, it is characterised in that the electronic equipment also includes:
Virus detection element, it is for after the os starting, the operation to be detected in real time by the antivirus software Whether system is loaded with the interior caryogram virus;
Second cleaning scheme acquiring unit, for when detecting that the operating system is loaded with the interior caryogram virus, from net The server of network side obtains the cleaning scheme of the interior caryogram virus;
Cleaning scheme writing unit, for will there is Extensible Firmware Interface described in the cleaning scheme write-in of the interior caryogram virus Basic input output system, remove the interior caryogram virus when starting next time so as to the basic input output system.
11. electronic equipment according to claim 10, it is characterised in that the second cleaning scheme acquiring unit, including:
Characteristic information transmission sub-unit, for sending the characteristic information of the interior caryogram virus to the server;
Cleaning scheme receiving subelement, the kernel to match with the characteristic information sent for receiving the server The cleaning scheme of type virus.
12. according to the electronic equipment described in claim any one of 7-11, it is characterised in that first cleaning scheme obtains single Member, in addition to:
First cleaning scheme second obtains subelement, for obtaining the second of the interior caryogram virus from the server of network side Cleaning scheme.
CN201310481967.1A 2013-10-15 2013-10-15 The method and system of caryogram virus in a kind of killing Active CN104573511B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310481967.1A CN104573511B (en) 2013-10-15 2013-10-15 The method and system of caryogram virus in a kind of killing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310481967.1A CN104573511B (en) 2013-10-15 2013-10-15 The method and system of caryogram virus in a kind of killing

Publications (2)

Publication Number Publication Date
CN104573511A CN104573511A (en) 2015-04-29
CN104573511B true CN104573511B (en) 2018-01-23

Family

ID=53089549

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310481967.1A Active CN104573511B (en) 2013-10-15 2013-10-15 The method and system of caryogram virus in a kind of killing

Country Status (1)

Country Link
CN (1) CN104573511B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106681813B (en) * 2016-12-15 2020-06-12 腾讯科技(深圳)有限公司 System management method and device
CN110851831B (en) * 2019-11-12 2023-04-28 腾讯科技(深圳)有限公司 Virus processing method, device, computer equipment and computer readable storage medium

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100472547C (en) * 2006-03-21 2009-03-25 联想(北京)有限公司 System and method for killing ROOTKIT
CN101877039A (en) * 2009-11-23 2010-11-03 浪潮电子信息产业股份有限公司 Fault detection technology of server operating system
CN102208002B (en) * 2011-06-09 2015-03-04 国民技术股份有限公司 Novel computer virus scanning and killing device

Also Published As

Publication number Publication date
CN104573511A (en) 2015-04-29

Similar Documents

Publication Publication Date Title
JP5978365B2 (en) System and method for performing network access control in a virtual environment
RU2589862C1 (en) Method of detecting malicious code in random-access memory
US9280664B2 (en) Apparatus and method for blocking activity of malware
US8181247B1 (en) System and method for protecting a computer system from the activity of malicious objects
EP3420489B1 (en) Cybersecurity systems and techniques
EP3299957A1 (en) Performing live updates to file system volumes
JP2017527931A (en) Malware detection method and system
CN104751063B (en) A kind of operating system trusted bootstrap method based on real pattern technology
EP2876572B1 (en) Firmware-level security agent supporting operating system-level security in computer system
US9588829B2 (en) Security method and apparatus directed at removable storage devices
WO2006047163A2 (en) System and method for identifying and removing malware on a computer system
WO2013026320A1 (en) Method and system for detecting webpage trojan embedded
WO2016019893A1 (en) Application installation method and apparatus
CN110334522A (en) Start the method and device of measurement
CN108228077A (en) The management method of memory block, operation method, device, equipment, readable medium
KR101974989B1 (en) Method and apparatus for determining behavior information corresponding to a dangerous file
EP3127036A1 (en) Systems and methods for identifying a source of a suspect event
CN104573511B (en) The method and system of caryogram virus in a kind of killing
CN105893847A (en) Method and device for protecting safety protection application program file and electronic equipment
EP3563281A1 (en) Persistence probing to detect malware
EP2584484B1 (en) System and method for protecting a computer system from the activity of malicious objects
EP2729893B1 (en) Security method and apparatus
CN103699838A (en) Identification method and equipment of viruses
CN103632086B (en) The method and apparatus for repairing basic input-output system BIOS rogue program
CN106572083A (en) Log processing method and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant