CN107025407A - The malicious code detecting method and system of a kind of office document files - Google Patents

The malicious code detecting method and system of a kind of office document files Download PDF

Info

Publication number
CN107025407A
CN107025407A CN201710175347.3A CN201710175347A CN107025407A CN 107025407 A CN107025407 A CN 107025407A CN 201710175347 A CN201710175347 A CN 201710175347A CN 107025407 A CN107025407 A CN 107025407A
Authority
CN
China
Prior art keywords
document files
detected
files
macrodoce
office
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710175347.3A
Other languages
Chinese (zh)
Inventor
李海灵
邹潇湘
高昕
侯美佳
何跃鹰
卓子寒
刘中金
方喆君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
National Computer Network and Information Security Management Center
Original Assignee
National Computer Network and Information Security Management Center
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by National Computer Network and Information Security Management Center filed Critical National Computer Network and Information Security Management Center
Priority to CN201710175347.3A priority Critical patent/CN107025407A/en
Publication of CN107025407A publication Critical patent/CN107025407A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/53Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/564Static detection by virus signature recognition

Abstract

The invention discloses a kind of malicious code detecting method of office document files, document files to be detected is put into virtual sandbox first to perform, and monitor whether there is abnormal behaviour, if judging document files to be detected in the presence of if as doubtful spilling document files, and further detected;Then the macrodoce of document files to be detected is extracted, the macrodoce is matched with malice macrodoce feature database, judge document files to be detected as macrovirus document files if the match is successful, otherwise the macrodoce is run, and monitor whether there is networking behavior, further detected if in the presence of if, this method is applied to enterprise product, can effectively prevent malice office document files from entering custom system and then perform malicious act.

Description

The malicious code detecting method and system of a kind of office document files
Technical field
The present invention relates to technical field of network security, specially a kind of malicious code detecting method of office document files And system.
Background technology
Malice office document files generally includes two kinds of situations, on the one hand grand for malice, on the other hand for spilling The malice office files of behavior.
Macrovirus is an ancient and fashionable for a time virus, and it can infect EXE files, grand disease unlike street virus Poison can infect office document files, there is cross-platform ability, and infect the document danger close of macrovirus, and its destructiveness is complete All dependent on the imagination of virus authors.Macrovirus is popular when the eighties of last century nineties, later considerably long one Make no public appearances, slowly faded out " safety loop " in the section time.Nearly 2 years, macrovirus occurred again, coordinated fishing mail, social worker's hand The modes such as section have the imposing manner staged a comeback again.
The document for having spilling behavior is typically to be given birth to office " leak ", and word document can be allowed by using leak Silently in other PE files of backstage, " APT " Advanced threat received much concern for nearly 2 years be generally also by hides using leakage In the office documents in hole, then coordinating what spear type fishing mail was propagated, therefore overflow the threat ability of document to infer.Institute It can be converted into various excessive risks according to different situations, different samples, distinct methods with the threat of Office document formats and threaten.
Nearly 2 years office document files virus is high, because common executable file can enjoy various protection systems System, antivirus software are of interest, and take method viral built in document files to hoodwink people and obtain more efficient infection mesh 's.Such as nearly 2 years popular blackmailer's virus, powershell viruses can infect user in built-in office document files System.
The content of the invention
In order to overcome the shortcomings of prior art, the present invention provides a kind of Malicious Code Detection of office document files Method, by combining the multiple technologies means such as sandbox judgement, static nature are matched, chain of processes judges, final effectively recognize is overflowed Class document files and macrovirus class document files, finally effectively prevent malice office document files from performing evil into custom system Meaning behavior.
The technical solution adopted for the present invention to solve the technical problems is:A kind of malicious code inspection of office document files Survey method, comprises the following steps:
(S10) document files to be detected is put into virtual sandbox to perform, and monitors whether there is abnormal behaviour, if in the presence of if Document files to be detected is judged as doubtful spilling document files, and is further detected;
(S20) macrodoce of document files to be detected is extracted, the macrodoce is matched with malice macrodoce feature database, if The match is successful then judges that document files to be detected, as macrovirus document files, otherwise runs the macrodoce, and monitor whether to deposit In networking behavior, further detected if in the presence of if.
As a kind of preferred technical scheme of the present invention, document files to be detected is put into virtually in the step (S10) It is to monitor whether to have abnormal behaviour by running the office softwares of each popular version after sandbox.
As a kind of preferred technical scheme of the present invention, monitor whether that there is abnormal behaviour includes in the step (S10):
With the presence or absence of suspicious EXE chain of processes, further detected if extracting correlation EXE files in the presence of if;
With the presence or absence of networking behavior, if judging in the presence of if, whether network matches with white list involved by networking behavior, if With normal file is then determined as, otherwise extracts correlation EXE files and further detected.
As a kind of preferred technical scheme of the present invention, the method that extraction correlation EXE files are further detected is specific For:EXE files are matched with file white list, are determined as normal file if the match is successful, otherwise according to existing strategy to institute State EXE files and carry out Malicious Code Detection.
It is used as a kind of preferred technical scheme of the present invention, if the networking behavior is present, its method further detected Including:
If networking involved by networking behavior is active, executable code is downloaded to local, and can described in determining whether Whether maliciously to perform code;
If network involved by networking behavior has been inactivated, involved network is matched with network white list, if it fails to match Then alarm and be determined as doubtful macrovirus document files.
The other present invention have also been devised a kind of malicious code detection system of office document files, including:
Spill file detection module, is performed for document files to be detected to be put into virtual sandbox, and monitors whether exist Abnormal behaviour, if judging document files to be detected in the presence of if as doubtful spilling document files, and is further detected;
Macrovirus detection module, the macrodoce for extracting document files to be detected, by the macrodoce and malice grand generation Code feature database matching, judges that document files to be detected, as macrovirus document files, otherwise runs the grand generation if the match is successful Code, and monitor whether there is networking behavior, further detected if in the presence of if.
Compared with prior art, the beneficial effects of the invention are as follows:The present invention provides a kind of malice of office document files Code detection method and system, on the one hand whether there is spilling behavior by monitoring document files to be detected, including:Input is virtual Sandbox performs and judges whether abnormal behaviour;On the other hand for possessing grand document files, then document to be detected is extracted Macrodoce in file, carries out static nature matching first, if it fails to match, macrodoce described in virtual operation, and mainly supervises Its networking behavior is controlled, the document files for possessing malicious code is finally determine whether by the further analysis to behavior of networking. Technical scheme of the present invention is directed to the most malice documents that presently, there are and all possesses preferably detection effect, can not only detect Possess the malice document files of spilling behavior, while the document files containing malice macrovirus can be effectively detected, and then effectively Prevent malice office document files from entering system, the system to user causes safely bigger threat.
Brief description of the drawings
A kind of malicious code detecting method embodiment flow chart for office document files that Fig. 1 provides for the present invention;
A kind of malicious code detection system example structure figure for office document files that Fig. 2 provides for the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation is described, it is clear that described embodiment is only a part of embodiment of the invention, rather than whole embodiments.It is based on Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under the premise of creative work is not made Embodiment, belongs to the scope of protection of the invention.
Embodiment:
As shown in figure 1, a kind of malicious code detecting method of office document files, including:
S101:Document files to be detected is put into virtual sandbox to perform, and monitors whether there is abnormal behaviour, if in the presence of if Document files to be detected is judged as doubtful spilling document files, and is further detected.
Wherein, it is described that document files to be detected is put into virtual sandbox execution, and monitor whether there is abnormal behaviour, specifically For:Document files to be detected is put into virtual sandbox, and runs the office softwares of each popular version, and monitors whether to exist different Chang Hangwei.Wherein, document files to be detected is run on the office softwares of each popular version, and then monitors operation result, is made Obtain testing result more comprehensive.
Wherein, it is described to monitor whether that there is abnormal behaviour includes but are not limited to:
With the presence or absence of suspicious EXE chain of processes, i.e., whether include suspicious EXE below female process of document files to be detected Process, is further detected if extracting correlation EXE files in the presence of if;Then it can consider when discovery has suspicious EXE subprocess There is the behavior for overflowing executable file in document files to be detected;
With the presence or absence of networking behavior, if judging in the presence of if, whether network matches with white list involved by networking behavior, if With normal file is then determined as, otherwise extracts correlation EXE files and further detected.Specific implementation method can be:Will connection The IP address of network is matched with domain name with white list involved by net behavior, and judges whether matching, is determined as if it fails to match There is doubtful spilling networking behavior, then can further extract related EXE files and further be detected.
Wherein, the extraction correlation EXE files are further detected, are specially:
EXE files are matched with file white list, are determined as normal file if the match is successful, otherwise according to existing strategy Malicious Code Detection is carried out to the EXE files.
S102:The macrodoce of document files to be detected is extracted, the macrodoce is matched with malice macrodoce feature database, if The match is successful then judges that document files to be detected, as macrovirus document files, otherwise performs S103.
Wherein, step S102 can first judge whether macrodoce passes through encryption, if by encryption, directly holding Row S103.
S103:The macrodoce is run, and monitors whether there is networking behavior, is further detected if in the presence of if.Remove Monitor whether to there is networking behavior, can also monitor whether there is malicious act, include but is not limited to:Delete file, encryption The obvious malicious operation such as user file, if so, then can directly be determined as macrovirus document files.
Wherein, it is described to monitor whether there is networking behavior, further detected if in the presence of if, specifically include but do not limit In:
If networking involved by networking behavior is active, executable code is downloaded to local, and can described in determining whether Whether maliciously to perform code;
If network involved by networking behavior has been inactivated, involved network is matched with network white list, if it fails to match Then alarm and be determined as doubtful macrovirus document files.Wherein, it is described by involved network matched with network white list can with but It is not limited to:The IP or domain name of involved network are matched with corresponding white list.
As shown in Fig. 2 the invention provides a kind of malicious code detection system of office document files, including:
Spill file detection module 201, is performed, and monitor whether to deposit for document files to be detected to be put into virtual sandbox In abnormal behaviour, if judging document files to be detected in the presence of if as doubtful spilling document files, and further detected;
Macrovirus detection module 202, the macrodoce for extracting document files to be detected is grand by the macrodoce and malice Code characteristic storehouse is matched, and judges that document files to be detected, as macrovirus document files, is otherwise run described grand if the match is successful Code, and monitor whether there is networking behavior, further detected if in the presence of if.
Each embodiment in this specification is described by the way of progressive, same or analogous between each embodiment Part is mutually referring to what each embodiment was stressed is the difference with other embodiment.Especially for system For embodiment, because it is substantially similar to embodiment of the method, so description is fairly simple, related part is implemented referring to method The part explanation of example.
As described above, the malicious code detecting method and system that above-described embodiment gives a kind of office document files are real Example is applied, is detected by the malicious code for two common at present classes for office document files, a class is to overflow class Document files, another kind of is macrovirus document files, and above-described embodiment is provided to possess and is directed to for the characteristic of two class malicious codes Property detection scheme, Static Detection and dynamic effective monitoring are combined and then the document files that can pinpoint the problems in time, effectively resistance Only malice office document files causes further loss into custom system.
It is obvious to a person skilled in the art that the invention is not restricted to the details of above-mentioned one exemplary embodiment, Er Qie In the case of without departing substantially from spirit or essential attributes of the invention, the present invention can be realized in other specific forms.Therefore, no matter From the point of view of which point, embodiment all should be regarded as exemplary, and be nonrestrictive, the scope of the present invention is by appended power Profit is required rather than described above is limited, it is intended that all in the implication and scope of the equivalency of claim by falling Change is included in the present invention.Any reference in claim should not be considered as to the claim involved by limitation.

Claims (6)

1. a kind of malicious code detecting method of office document files, it is characterised in that:Comprise the following steps:
(S10) document files to be detected is put into virtual sandbox to perform, and monitors whether there is abnormal behaviour, if judging in the presence of if Document files to be detected is doubtful spilling document files, and is further detected;
(S20) macrodoce of document files to be detected is extracted, the macrodoce is matched with malice macrodoce feature database, if matching It is successful then judge document files to be detected as macrovirus document files, the macrodoce is otherwise run, and monitor whether there is connection Net behavior, is further detected if in the presence of if.
2. a kind of malicious code detecting method of office document files according to claim 1, it is characterised in that:It is described Document files to be detected is put into after virtual sandbox in step (S10), be by run the office softwares of each popular version come Monitor whether there is abnormal behaviour.
3. a kind of malicious code detecting method of office document files according to claim 1, it is characterised in that:It is described Monitor whether that there is abnormal behaviour includes in step (S10):
With the presence or absence of suspicious EXE chain of processes, further detected if extracting correlation EXE files in the presence of if;
With the presence or absence of networking behavior, if judging in the presence of if, whether network matches with white list involved by networking behavior, if matching It is determined as normal file, otherwise extracts correlation EXE files and further detected.
4. a kind of malicious code detecting method of office document files according to claim 3, it is characterised in that:Extract The method that related EXE files are further detected is specially:EXE files are matched with file white list, if the match is successful It is determined as normal file, Malicious Code Detection otherwise is carried out to the EXE files according to existing strategy.
5. a kind of Novel lifesaving hammer according to claim 3, it is characterised in that if the networking behavior is present, it enters The method of one step detection includes:
If networking involved by networking behavior is active, executable code is downloaded to local, and determine whether described can perform Maliciously whether code;
If network involved by networking behavior has been inactivated, involved network is matched with network white list, reported if it fails to match Warn and be determined as doubtful macrovirus document files.
6. a kind of malicious code detection system of office document files, it is characterised in that including:
Spill file detection module, is performed for document files to be detected to be put into virtual sandbox, and monitors whether there is exception Behavior, if judging document files to be detected in the presence of if as doubtful spilling document files, and is further detected;
Macrovirus detection module, the macrodoce for extracting document files to be detected is special by the macrodoce and malice macrodoce Storehouse matching is levied, judges that document files to be detected, as macrovirus document files, otherwise runs the macrodoce if the match is successful, and Monitor whether there is networking behavior, further detected if in the presence of if.
CN201710175347.3A 2017-03-22 2017-03-22 The malicious code detecting method and system of a kind of office document files Pending CN107025407A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710175347.3A CN107025407A (en) 2017-03-22 2017-03-22 The malicious code detecting method and system of a kind of office document files

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710175347.3A CN107025407A (en) 2017-03-22 2017-03-22 The malicious code detecting method and system of a kind of office document files

Publications (1)

Publication Number Publication Date
CN107025407A true CN107025407A (en) 2017-08-08

Family

ID=59525724

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710175347.3A Pending CN107025407A (en) 2017-03-22 2017-03-22 The malicious code detecting method and system of a kind of office document files

Country Status (1)

Country Link
CN (1) CN107025407A (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108182363A (en) * 2017-12-25 2018-06-19 哈尔滨安天科技股份有限公司 Detection method, system and the storage medium of embedded office documents
CN108197472A (en) * 2017-12-20 2018-06-22 北京金山安全管理系统技术有限公司 macro processing method, device, storage medium and processor
CN108804921A (en) * 2018-05-29 2018-11-13 中国科学院信息工程研究所 The going of a kind of PowerShell codes obscures method and device
CN109033831A (en) * 2018-06-22 2018-12-18 珠海市君天电子科技有限公司 A kind of method for detecting virus, device, electronic equipment and storage medium
CN109104429A (en) * 2018-09-05 2018-12-28 广东石油化工学院 A kind of detection method for network fraud information
CN109918622A (en) * 2019-02-27 2019-06-21 中国地质大学(武汉) The method and system converted from Word document to LaTeX document are realized based on JAVA
CN110648118A (en) * 2019-09-27 2020-01-03 深信服科技股份有限公司 Fish fork mail detection method and device, electronic equipment and readable storage medium
CN110737894A (en) * 2018-12-04 2020-01-31 哈尔滨安天科技集团股份有限公司 Composite document security detection method and device, electronic equipment and storage medium
CN110858170A (en) * 2018-08-23 2020-03-03 阿里巴巴集团控股有限公司 Sandbox component, data abnormity monitoring method, equipment and storage medium
CN110866256A (en) * 2019-11-12 2020-03-06 深信服科技股份有限公司 Macro code detection method, device, equipment and storage medium
CN111723373A (en) * 2019-03-19 2020-09-29 国家计算机网络与信息安全管理中心 Vulnerability exploitation file detection method and device of composite binary document
CN113515744A (en) * 2021-03-24 2021-10-19 杭州安恒信息技术股份有限公司 Malicious document detection method, device and system, electronic device and storage medium
CN113742475A (en) * 2021-09-10 2021-12-03 绿盟科技集团股份有限公司 Office document detection method, apparatus, device and medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102841999A (en) * 2012-07-16 2012-12-26 北京奇虎科技有限公司 Method and device for detecting macro virus of files
CN103246847A (en) * 2013-05-13 2013-08-14 腾讯科技(深圳)有限公司 Method and device for scanning and killing macro viruses
CN103500309A (en) * 2013-09-26 2014-01-08 北京奇虎科技有限公司 Method and device for detecting and killing macro virus
CN103970574A (en) * 2014-05-22 2014-08-06 北京奇虎科技有限公司 Office program running method and device and computer system
CN104794397A (en) * 2014-01-22 2015-07-22 腾讯科技(深圳)有限公司 Virus detection method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102841999A (en) * 2012-07-16 2012-12-26 北京奇虎科技有限公司 Method and device for detecting macro virus of files
CN103246847A (en) * 2013-05-13 2013-08-14 腾讯科技(深圳)有限公司 Method and device for scanning and killing macro viruses
CN103500309A (en) * 2013-09-26 2014-01-08 北京奇虎科技有限公司 Method and device for detecting and killing macro virus
CN104794397A (en) * 2014-01-22 2015-07-22 腾讯科技(深圳)有限公司 Virus detection method and device
CN103970574A (en) * 2014-05-22 2014-08-06 北京奇虎科技有限公司 Office program running method and device and computer system

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108197472A (en) * 2017-12-20 2018-06-22 北京金山安全管理系统技术有限公司 macro processing method, device, storage medium and processor
CN108182363A (en) * 2017-12-25 2018-06-19 哈尔滨安天科技股份有限公司 Detection method, system and the storage medium of embedded office documents
CN108182363B (en) * 2017-12-25 2022-01-07 安天科技集团股份有限公司 Detection method, system and storage medium of embedded office document
CN108804921A (en) * 2018-05-29 2018-11-13 中国科学院信息工程研究所 The going of a kind of PowerShell codes obscures method and device
CN109033831A (en) * 2018-06-22 2018-12-18 珠海市君天电子科技有限公司 A kind of method for detecting virus, device, electronic equipment and storage medium
CN110858170A (en) * 2018-08-23 2020-03-03 阿里巴巴集团控股有限公司 Sandbox component, data abnormity monitoring method, equipment and storage medium
CN110858170B (en) * 2018-08-23 2023-06-30 阿里巴巴集团控股有限公司 Data anomaly monitoring method and device
CN109104429A (en) * 2018-09-05 2018-12-28 广东石油化工学院 A kind of detection method for network fraud information
CN109104429B (en) * 2018-09-05 2021-09-28 广东石油化工学院 Detection method for phishing information
CN110737894A (en) * 2018-12-04 2020-01-31 哈尔滨安天科技集团股份有限公司 Composite document security detection method and device, electronic equipment and storage medium
CN109918622A (en) * 2019-02-27 2019-06-21 中国地质大学(武汉) The method and system converted from Word document to LaTeX document are realized based on JAVA
CN111723373A (en) * 2019-03-19 2020-09-29 国家计算机网络与信息安全管理中心 Vulnerability exploitation file detection method and device of composite binary document
CN110648118A (en) * 2019-09-27 2020-01-03 深信服科技股份有限公司 Fish fork mail detection method and device, electronic equipment and readable storage medium
CN110866256A (en) * 2019-11-12 2020-03-06 深信服科技股份有限公司 Macro code detection method, device, equipment and storage medium
CN113515744A (en) * 2021-03-24 2021-10-19 杭州安恒信息技术股份有限公司 Malicious document detection method, device and system, electronic device and storage medium
CN113742475A (en) * 2021-09-10 2021-12-03 绿盟科技集团股份有限公司 Office document detection method, apparatus, device and medium

Similar Documents

Publication Publication Date Title
CN107025407A (en) The malicious code detecting method and system of a kind of office document files
CN106790186B (en) Multi-step attack detection method based on multi-source abnormal event correlation analysis
CN104767757B (en) Various dimensions safety monitoring method and system based on WEB service
CN104091121B (en) The detection, excision and the method recovered of the malicious code of bag Malware are beaten again Android
CN102841999B (en) A kind of file method and a device for detecting macro virus
EP1995929A2 (en) Distributed system for the detection of eThreats
CN103905459A (en) Cloud-based intelligent security defense system and defense method
CN106953855B (en) Method for intrusion detection of GOOSE message of IEC61850 digital substation
CN103118036A (en) Cloud end based intelligent security protection system and method
CN113422771A (en) Threat early warning method and system
CN103957205A (en) Trojan horse detection method based on terminal traffic
CN104008332A (en) Intrusion detection system based on Android platform
CN106599688A (en) Application category-based Android malicious software detection method
CN103150511A (en) Safety protection system
CN101873231B (en) Network intrusion character configuration method and system
CN101699787B (en) Worm detection method used for peer-to-peer network
CN104598820A (en) Trojan virus detection method based on feature behavior activity
CN107122659A (en) A kind of method of malicious code or leak in quick positioning Android application software
CN108171054A (en) The detection method and system of a kind of malicious code for social deception
CN105205356A (en) APP application re-packaging detection method
CN103268449A (en) Method and system for detecting mobile phone malicious codes at high speed
CN103955644B (en) A kind of static Trojan detecting method based on terminal self-starting
CN110287704A (en) A kind of loophole software dependence construction method based on loophole map
KR100688604B1 (en) Apparatus and method for intercepting malicious executable code in the network
CN106650447A (en) Method and system for preventing PowerShell malicious code execution

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170808

RJ01 Rejection of invention patent application after publication