CN110119618B - Malicious script detection method and device - Google Patents

Malicious script detection method and device Download PDF

Info

Publication number
CN110119618B
CN110119618B CN201811291818.8A CN201811291818A CN110119618B CN 110119618 B CN110119618 B CN 110119618B CN 201811291818 A CN201811291818 A CN 201811291818A CN 110119618 B CN110119618 B CN 110119618B
Authority
CN
China
Prior art keywords
script
malicious
logic
processing
tested
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811291818.8A
Other languages
Chinese (zh)
Other versions
CN110119618A (en
Inventor
李石磊
王春秋
童志明
何公道
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Antiy Technology Group Co Ltd
Original Assignee
Harbin Antian Science And Technology Group Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Harbin Antian Science And Technology Group Co ltd filed Critical Harbin Antian Science And Technology Group Co ltd
Priority to CN201811291818.8A priority Critical patent/CN110119618B/en
Publication of CN110119618A publication Critical patent/CN110119618A/en
Application granted granted Critical
Publication of CN110119618B publication Critical patent/CN110119618B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities

Abstract

The invention discloses a method and a device for detecting a malicious script, wherein the method comprises the following steps: acquiring a script to be tested, and acquiring a plurality of logic blocks of the script to be tested through lexical grammar analysis; dynamically processing each logic block of the plurality of logic blocks, and acquiring a processing result of each logic block; and acquiring a malicious detection result of the script to be detected according to the processing result of each logic block. The method can enable the malicious code to be executed unconditionally in dynamic detection, quickly and accurately detect the real malicious behavior of the malicious script, and realize effective detection of the malicious script, so that the accuracy and reliability of detection are effectively improved, a user can be prevented from being attacked by the malicious script, and the use experience of the user is improved.

Description

Malicious script detection method and device
Technical Field
The invention relates to the technical field of computer network security, in particular to a method and a device for detecting a malicious script.
Background
In the related art, the method for dynamically detecting the malicious code judges the malicious behavior executed by the code in the virtual environment, so that the dynamic detection of the malicious code is realized.
However, for a malicious script that bypasses the execution of the malicious code in a manner of delaying, judging the current time and other anti-sandboxes, and a malicious script that hides the malicious behavior of the script and prolongs the analysis period of an analyst by using means such as encryption, compression, obfuscation, and the like, the malicious behavior cannot be effectively detected due to the fact that the actual malicious code cannot be executed, and therefore, in the related art, the malicious script that does not execute the actual malicious code cannot be effectively detected, so that the true malicious behavior of the malicious script cannot be detected, the accuracy and reliability of detection are poor, and further, the attack of the malicious script cannot be effectively avoided, the use experience is greatly reduced, and urgent solution needs to be provided.
Disclosure of Invention
The present invention is directed to solving, at least to some extent, one of the technical problems in the related art.
To this end, a first object of the present invention is to propose a method for detecting malicious scripts.
A second object of the present invention is to provide a malicious script detection apparatus.
A third object of the invention is to propose a computer device.
A fourth object of the invention is to propose a non-transitory computer-readable storage medium.
A fifth object of the invention is to propose a computer program product.
In order to achieve the above object, an embodiment of a first aspect of the present invention provides a method for detecting a malicious script, including the following steps: acquiring a script to be tested, and acquiring a plurality of logic blocks of the script to be tested through lexical grammar analysis; dynamically processing each logic block of the plurality of logic blocks, and acquiring a processing result of each logic block; and acquiring a malicious detection result of the script to be detected according to the processing result of each logic block.
The detection method of the malicious script in the embodiment of the invention can enable the malicious code to be executed unconditionally in dynamic detection, quickly and accurately detect the real malicious behavior of the malicious script, and realize effective detection of the malicious script, thereby effectively improving the accuracy and reliability of detection, further enabling a user to avoid being attacked by the malicious script, and improving the use experience of the user.
In addition, the method for detecting a malicious script according to the above embodiment of the present invention may further have the following additional technical features:
further, in an embodiment of the present invention, the obtaining the plurality of logic blocks of the script to be tested through lexical grammar analysis further includes: and taking each independently executed minimum statement unit in the script to be tested as a logic block through lexical grammar analysis so as to obtain the plurality of logic blocks by division.
Further, in an embodiment of the present invention, the method further includes: and saving the processing result of each logic block.
Further, in an embodiment of the present invention, the dynamically processing each of the plurality of logical partitions includes: and calling a dynamic processing interface to sequentially transmit the plurality of logic blocks to perform dynamic processing.
In order to achieve the above object, a second embodiment of the present invention provides a malicious script detection apparatus, including: the system comprises a first acquisition module, a second acquisition module and a third acquisition module, wherein the first acquisition module is used for acquiring a script to be tested and acquiring a plurality of logic blocks of the script to be tested through lexical grammar analysis; the processing module is used for dynamically processing each logic block of the plurality of logic blocks and acquiring the processing result of each logic block; and the second acquisition module is used for acquiring the malicious detection result of the script to be detected according to the processing result of each logic block.
The detection device for the malicious script provided by the embodiment of the invention can enable the malicious code to be executed unconditionally in dynamic detection, quickly and accurately detect the real malicious behavior of the malicious script, and realize effective detection of the malicious script, so that the accuracy and reliability of detection are effectively improved, a user can be prevented from being attacked by the malicious script, and the use experience of the user is improved.
In addition, the detection apparatus for malicious scripts according to the above embodiment of the present invention may further have the following additional technical features:
further, in an embodiment of the present invention, the first obtaining module is further configured to use each separately executed minimum statement unit in the script to be tested as a logic partition through lexical grammar analysis, so as to obtain the plurality of logic partitions through segmentation; the processing module is further used for calling a dynamic processing interface so as to sequentially transmit the plurality of logic blocks to be dynamically processed.
Further, in an embodiment of the present invention, the method further includes: and the storage module is used for storing the processing result of each logic block.
In order to achieve the above object, a third embodiment of the present invention provides a computer device, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, and when the processor executes the computer program, the processor implements the method for dynamically detecting malicious code according to the above embodiment.
To achieve the above object, a fourth aspect of the present invention provides a non-transitory computer-readable storage medium, on which a computer program is stored, and when the computer program is executed by a processor, the method for dynamically detecting malicious code according to the above embodiment is implemented.
To achieve the above object, a fifth aspect of the present invention provides a computer program product, wherein when the instructions in the computer program product are executed by a processor, the method for dynamically detecting malicious code according to the above embodiments is performed.
Additional aspects and advantages of the invention will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the invention.
Drawings
The foregoing and/or additional aspects and advantages of the present invention will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
FIG. 1 is a flow diagram of a method of detecting malicious scripts according to one embodiment of the present invention;
FIG. 2 is a flow diagram of a method for malicious script detection according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of a malicious script detection apparatus according to an embodiment of the present invention.
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the drawings are illustrative and intended to be illustrative of the invention and are not to be construed as limiting the invention.
The following describes a method and an apparatus for detecting a malicious script according to an embodiment of the present invention with reference to the drawings, and first, a method for detecting a malicious script according to an embodiment of the present invention will be described with reference to the drawings.
FIG. 1 is a flow chart of a method of detecting malicious scripts according to one embodiment of the present invention.
As shown in fig. 1, the method for detecting malicious scripts includes the following steps:
in step S101, a script to be tested is obtained, and a plurality of logical blocks of the script to be tested are obtained through lexical grammar analysis.
It can be understood that, as shown in fig. 2, in the embodiment of the present invention, a script to be detected is first obtained, and the script to be detected is subjected to static logic partitioning preprocessing in a lexical grammar analysis or other manners.
It should be noted that, in the embodiment of the present invention, the static logic blocking preprocessing is performed on the script to be detected, and the purpose of blocking is to eliminate the influence of all logic judgments and function calls in the script on the following dynamic processing result. That is to say, the static logic block preprocessing can effectively solve the influence of all logic judgment and function call in the script on the next dynamic processing result, thereby improving the acquisition capability and accuracy of the dynamic behavior.
Further, in an embodiment of the present invention, obtaining a plurality of logical partitions of the script to be tested through lexical grammar analysis further includes: and taking each independently executed minimum statement unit in the script to be tested as a logic block through lexical grammar analysis so as to obtain a plurality of logic blocks through segmentation.
It is understood that the blocking method is to use the smallest statement unit that can be executed by each entry in the script individually as a logical block according to the lexical grammar analysis (e.g., divide the statements in if/else into unconditional execution, etc.).
In step S102, dynamic processing is performed on each of the plurality of logical blocks, and a processing result of each logical block is acquired.
It can be understood that, in the embodiment of the present invention, the plurality of logical partitions are sent to the dynamic detection module, and the dynamic detection module performs dynamic processing on the plurality of received logical partitions.
Further, in an embodiment of the present invention, dynamically processing each of the plurality of logical partitions includes: and calling a dynamic processing interface to sequentially transmit the plurality of logic blocks for dynamic processing.
It can be understood that, in the embodiment of the present invention, the dynamic processing interface is invoked to sequentially transfer the divided logical partitions into the dynamic processing, so as to obtain the processing result of each logical partition, and thus when an error occurs in the dynamic processing process of one partition, the dynamic processing of the subsequent module is not affected, and more codes can be executed as much as possible, thereby improving the obtaining capability of the dynamic behavior of the malicious code.
Further, in an embodiment of the present invention, the method of an embodiment of the present invention further includes: the processing result of each logical block is saved.
It is understood that, as shown in fig. 2, the embodiment of the present invention may store the processing result after each block is dynamically processed.
In step S103, a malicious detection result of the script to be detected is obtained according to the processing result of each logic block.
For example, most of malicious scripts to be detected are subjected to measures such as compression, encryption, confusion and the like, and if the detection is performed according to a traditional dynamic detection mode, the malicious behavior of the malicious scripts cannot be really detected when the execution of malicious codes is bypassed by means of anti-sandbox such as time delay and current time judgment. Therefore, the embodiment of the invention adds the static logic block preprocessing function before dynamically processing the script to be detected, so that each sentence which can be independently executed can be executed during dynamic processing, thereby effectively improving the acquisition capability and the accuracy of the dynamic behavior of the malicious code.
Specifically, in one embodiment of the present invention, as shown in fig. 2, the method of the embodiment of the present invention includes the following steps:
step S201 starts.
Step S202, detecting the script.
That is, the script to be tested is acquired, and the process proceeds to step S203.
Step S203, static logic blocking.
Specifically, static logic partitioning preprocessing is performed on the script to be detected through lexical and grammatical analysis and the like, so that influence of all logic judgment and function calling in the script on a next dynamic processing result is eliminated.
In the embodiment of the invention, the static logic block preprocessing function is added, so that each statement which can be executed independently can be executed during dynamic processing, and the acquisition capability and the accuracy of the dynamic behavior of the malicious code can be effectively improved.
And step S204, dynamic processing.
After the static logic blocks are preprocessed, the divided logic blocks are sequentially transmitted to be dynamically processed, so that the processing result of each logic block is obtained, the dynamic processing of a subsequent module is prevented from being influenced when one block has an error in the dynamic processing process, more codes are effectively executed, and the acquisition capacity of the dynamic behavior of malicious codes is improved.
In step S205, the result of each block processing is saved.
And step S206, obtaining a malicious detection result according to each block processing result.
In short, if the detection is performed according to the dynamic detection method of the related art, if the execution of the malicious code is bypassed by the anti-sandbox methods such as delaying and judging the current time, the malicious behavior of the malicious script cannot be really detected, however, in the embodiment of the present invention, a static logic block preprocessing function is added before dynamically processing the script to be detected, so that each statement that can be executed independently can be executed during dynamic processing, and the dynamic processing interface is invoked to sequentially transfer the divided logic blocks into the dynamic processing, thereby obtaining the processing result of each logic block.
And step S207, ending.
The embodiment of the invention can enable the malicious code to be unconditionally executed in dynamic detection, quickly and accurately detect the real malicious behavior of the malicious script, realize effective detection of the malicious script, further effectively detect the real malicious behavior of the malicious script and avoid being attacked by the malicious script.
According to the detection method of the malicious script provided by the embodiment of the invention, the logic block preprocessing function is added on the static detection method and the dynamic processing is combined, so that the malicious code can be executed unconditionally in the dynamic detection, the real malicious behavior of the malicious script can be rapidly and accurately detected, and the effective detection of the malicious script is realized, thereby effectively improving the acquisition capability of the dynamic behavior of the malicious code, effectively improving the accuracy and reliability of the detection, further preventing a user from being attacked by the malicious script, and improving the use experience of the user.
Next, a detection apparatus of a malicious script proposed according to an embodiment of the present invention is described with reference to the drawings.
Fig. 3 is a schematic structural diagram of a malicious script detection apparatus according to an embodiment of the present invention.
As shown in fig. 3, the malicious script detection apparatus 10 includes: a first acquisition module 100, a processing module 200 and a second acquisition module 300.
The first obtaining module 100 is configured to obtain a script to be tested, and obtain a plurality of logic blocks of the script to be tested through lexical syntax analysis. The processing module 200 is configured to perform dynamic processing on each of the plurality of logical partitions, and obtain a processing result of each logical partition. The second obtaining module 300 is configured to obtain a malicious detection result of the script to be detected according to the processing result of each logic block. The device 10 of the embodiment of the invention can enable the malicious code to be executed unconditionally in dynamic detection, quickly and accurately detect the real malicious behavior of the malicious script, and realize effective detection of the malicious script, thereby effectively improving the accuracy and reliability of detection, further enabling a user to avoid being attacked by the malicious script, and improving the use experience of the user.
Further, in an embodiment of the present invention, the first obtaining module 100 is further configured to use each separately executed minimum statement unit in the script to be tested as a logic partition through lexical grammar analysis, so as to obtain a plurality of logic partitions through segmentation; the processing module is further used for calling the dynamic processing interface so as to sequentially transmit the plurality of logic blocks to be dynamically processed.
Further, in one embodiment of the present invention, the apparatus 10 of the embodiment of the present invention further comprises: and a storage module. The storage module is used for storing the processing result of each logic block.
It should be noted that the explanation of the foregoing embodiment of the method for detecting a malicious script is also applicable to the apparatus for detecting a malicious script of this embodiment, and details are not described here again.
According to the detection device for the malicious script, which is provided by the embodiment of the invention, the logic block preprocessing function is added on the static detection method and the dynamic processing is combined, so that the malicious code can be executed unconditionally in the dynamic detection, the true malicious behavior of the malicious script can be rapidly and accurately detected, and the effective detection of the malicious script is realized, thereby effectively improving the acquisition capability of the dynamic behavior of the malicious code, effectively improving the accuracy and reliability of the detection, further preventing a user from being attacked by the malicious script, and improving the use experience of the user.
In addition, an embodiment of the present invention further provides a computer device, which includes a memory, a processor, and a computer program that is stored in the memory and can be run on the processor, and when the processor executes the program, the method for dynamically detecting malicious codes according to the above embodiment is implemented.
Furthermore, an embodiment of the present invention further provides a non-transitory computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the method for dynamically detecting malicious code according to the above embodiment.
Furthermore, the first embodiment of the present invention further provides a computer program product, wherein when instructions in the computer program product are executed by a processor, the method for dynamically detecting malicious code according to the above embodiments is performed.
Furthermore, the terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In the description of the present invention, "a plurality" means at least two, e.g., two, three, etc., unless specifically limited otherwise.
In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above are not necessarily intended to refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction.
Although embodiments of the present invention have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present invention, and that variations, modifications, substitutions and alterations can be made to the above embodiments by those of ordinary skill in the art within the scope of the present invention.

Claims (8)

1. A method for detecting a malicious script is characterized by comprising the following steps:
the method comprises the steps of obtaining a script to be tested, obtaining a plurality of logic blocks of the script to be tested through lexical grammar analysis, obtaining the plurality of logic blocks of the script to be tested through the lexical grammar analysis, and further comprising the following steps: taking each independently executed minimum statement unit in the script to be tested as a logic block through lexical grammar analysis to obtain a plurality of logic blocks through segmentation;
dynamically processing each logic block of the plurality of logic blocks, and acquiring a processing result of each logic block; and
and acquiring a malicious detection result of the script to be detected according to the processing result of each logic block.
2. The method for detecting a malicious script according to claim 1, further comprising:
and saving the processing result of each logic partition.
3. The method according to claim 1, wherein the dynamically processing each of the plurality of logical partitions comprises: and calling a dynamic processing interface to sequentially transmit the plurality of logic blocks to perform dynamic processing.
4. An apparatus for detecting a malicious script, comprising:
the system comprises a first acquisition module, a second acquisition module and a third acquisition module, wherein the first acquisition module is used for acquiring a script to be tested and acquiring a plurality of logic blocks of the script to be tested through lexical grammar analysis, and the first acquisition module is further used for taking each independently-executed minimum statement unit in the script to be tested as one logic block through lexical grammar analysis so as to obtain the plurality of logic blocks through division;
the processing module is used for dynamically processing each logic partition of the plurality of logic partitions and acquiring the processing result of each logic partition; and
and the second acquisition module is used for acquiring the malicious detection result of the script to be detected according to the processing result of each logic block.
5. The apparatus for detecting malicious scripts according to claim 4, wherein,
the processing module is further used for calling a dynamic processing interface so as to sequentially transmit the plurality of logic blocks to be dynamically processed.
6. The apparatus for detecting a malicious script according to claim 4, further comprising:
and the storage module is used for storing the processing result of each logic block.
7. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing a method of detecting malicious scripts according to any of claims 1-3 when executing the program.
8. A non-transitory computer-readable storage medium having stored thereon a computer program, wherein the program, when executed by a processor, implements the method of detecting malicious scripts according to any one of claims 1 to 3.
CN201811291818.8A 2018-10-31 2018-10-31 Malicious script detection method and device Active CN110119618B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811291818.8A CN110119618B (en) 2018-10-31 2018-10-31 Malicious script detection method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811291818.8A CN110119618B (en) 2018-10-31 2018-10-31 Malicious script detection method and device

Publications (2)

Publication Number Publication Date
CN110119618A CN110119618A (en) 2019-08-13
CN110119618B true CN110119618B (en) 2021-05-04

Family

ID=67519717

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811291818.8A Active CN110119618B (en) 2018-10-31 2018-10-31 Malicious script detection method and device

Country Status (1)

Country Link
CN (1) CN110119618B (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101799855A (en) * 2010-03-12 2010-08-11 北京大学 Simulated webpage Trojan detecting method based on ActiveX component

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101083311B1 (en) * 2010-03-29 2011-11-15 한국전자통신연구원 System for detecting malicious script and method for detecting malicious script using the same
CN103559441B (en) * 2013-10-28 2016-04-27 中国科学院信息工程研究所 Cross-platform detection method and system under a kind of malicious file cloud environment
CN104333558B (en) * 2014-11-17 2018-02-23 广州华多网络科技有限公司 A kind of network address detection method and network address detection means
WO2018131199A1 (en) * 2017-01-11 2018-07-19 日本電信電話株式会社 Combining device, combining method and combining program

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101799855A (en) * 2010-03-12 2010-08-11 北京大学 Simulated webpage Trojan detecting method based on ActiveX component

Also Published As

Publication number Publication date
CN110119618A (en) 2019-08-13

Similar Documents

Publication Publication Date Title
US8516589B2 (en) Apparatus and method for preventing virus code execution
US8627478B2 (en) Method and apparatus for inspecting non-portable executable files
US9977897B2 (en) System and method for detecting stack pivot programming exploit
US8505099B2 (en) Machine-implemented method and system for determining whether a to-be-analyzed software is a known malware or a variant of the known malware
CN106709325B (en) Method and device for monitoring program
JP2011233125A (en) Method and apparatus for handling intelligent bot utilizing camouflage virtual machine information
US9910983B2 (en) Malware detection
KR102317833B1 (en) method for machine LEARNING of MALWARE DETECTING MODEL AND METHOD FOR detecting Malware USING THE SAME
US20170103206A1 (en) Method and apparatus for capturing operation in a container-based virtualization system
US10713146B2 (en) Dynamic binary translation and instrumentation with postponed attachment to running native threads
CN109255240B (en) Vulnerability processing method and device
CN113162945B (en) Vulnerability detection analysis method and device and vulnerability verification method and system based on vulnerability detection analysis method and device
CN103617396B (en) The detection method of a kind of vulnerability exploit and system
US9552284B2 (en) Determining valid inputs for an unknown binary program
CN106529342B (en) Virtual machine monitor dynamic integrity detection method based on security chip
CN114139154A (en) Malicious code detection method and device, computer and readable storage medium
CN110119618B (en) Malicious script detection method and device
CN106529284B (en) Virtual machine monitor security reinforcement method based on security chip
US20140026216A1 (en) System, method, and computer program product for detecting unwanted data based on scanning associated with a payload execution and a behavioral analysis
CN108197475B (en) Malicious so module detection method and related device
KR20200067044A (en) Method and apparatus for detecting malicious file
CN115174192A (en) Application security protection method and device, electronic equipment and storage medium
CN105653948B (en) Method and device for preventing malicious operation
CN109992482B (en) Method, device, computer equipment and storage medium for observing middleware destructor
US10599845B2 (en) Malicious code deactivating apparatus and method of operating the same

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 150028 Building 7, Innovation Plaza, Science and Technology Innovation City, Harbin Hi-tech Industrial Development Zone, Harbin, Heilongjiang Province (838 Shikun Road)

Applicant after: Harbin antiy Technology Group Limited by Share Ltd

Address before: Room 506, Room 162, Hongqi Street, No. 17 Building, Nangang, High-tech Venture Center, Harbin High-tech Industrial Development Zone, Heilongjiang Province, 150000

Applicant before: Harbin Antiy Technology Co., Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder

Address after: 150028 building 7, innovation and entrepreneurship square, science and technology innovation city, Harbin high tech Industrial Development Zone, Harbin, Heilongjiang Province (No. 838, Shikun Road)

Patentee after: Antan Technology Group Co.,Ltd.

Address before: 150028 building 7, innovation and entrepreneurship square, science and technology innovation city, Harbin high tech Industrial Development Zone, Harbin, Heilongjiang Province (No. 838, Shikun Road)

Patentee before: Harbin Antian Science and Technology Group Co.,Ltd.

CP01 Change in the name or title of a patent holder