TW542999B - A method and system for filtering computer virus using virus codewords - Google Patents
A method and system for filtering computer virus using virus codewords Download PDFInfo
- Publication number
- TW542999B TW542999B TW89123667A TW89123667A TW542999B TW 542999 B TW542999 B TW 542999B TW 89123667 A TW89123667 A TW 89123667A TW 89123667 A TW89123667 A TW 89123667A TW 542999 B TW542999 B TW 542999B
- Authority
- TW
- Taiwan
- Prior art keywords
- virus
- file
- computer
- executable
- codeword
- Prior art date
Links
Landscapes
- Storage Device Security (AREA)
Abstract
Description
案號 五、發明說明(1) 89123667Case number V. Description of invention (1) 89123667
【技術領域】 似病毒的方法與 與系統,其係只 及其所有的變形 碼所導致掃毒速 本案係有關^一種利用病毒碼字過滤電 糸統’特別是指一種過濾電腦病毒的方法 要用比較精簡之病毒碼字即可檢查出病毒 病毒,進而改善傳統以較龐大之病毒定義 度日益緩慢之缺點。 【習知技藝】[Technical field] Virus-like methods and systems, which are related to the virus scanning speed caused by only its all deformation codes ^ A method of filtering computer systems using virus code words, especially a method for filtering computer viruses Viruses can be detected with a more condensed virus codeword, thereby improving the disadvantage that traditional definitions of larger viruses are becoming slower and slower. [Learning skills]
早期電腦病毒被認為是一電腦程序,它只能複製電腦 病毒程式的一部分或全部至其他可執行程式。但是=集 (MACRO)病毒及數符(SCRiPT)病毒,如梅麗反我愛 你病毒,則徹底推翻了早期對電腦病毒的所作的定義。這 兩種類型的病毒能利用文件和網頁去做感染電腦和破壞電 腦^統的動作。電腦病毒都具有複製的能力,因為一個沒 有複製能力的電腦病毒根本無法感染其他電腦系统以達到 破壞或惡作劇的目的。因此我們這裏所謂的電腦病毒必須 具有複製的能力。 至7 ,已經超過萬隻的電腦病毒被發現,隨著變形引Early computer viruses were considered to be a computer program that could only copy part or all of a computer virus program to other executable programs. However, the MACRO virus and the SCRiPT virus, such as the anti-I love you virus, have completely overturned the earlier definition of computer viruses. These two types of viruses can use files and web pages to infect computers and disrupt computer systems. Computer viruses have the ability to copy, because a computer virus that does not have the ability to copy cannot infect other computer systems at all to achieve the purpose of destruction or mischief. So what we call a computer virus here must have the ability to replicate. To 7, more than 10,000 computer viruses have been found.
擎的使用及網際網路的普遍化,纟們相信更多的電腦病毒 ^被有心人以更快的速度製造出來。然而絕大多數的電腦 ,^由於缺乏新病毒的資訊,沒有更新防毒軟體的版本 者口琅新的病毒定義碼(ViruS Definiti〇n pattern), «ι ϋ中了病毋的日守候,都不知道該如何去適當地處理相關 兆美元With the use of the engine and the popularization of the Internet, we believe that more computer viruses are being created at a faster rate by caring people. However, most computers, due to lack of information on new viruses, have not updated the version of their anti-virus software, and have new virus definition codes (ViruS Definiti〇n pattern). Know how to properly deal with the relevant trillion dollars
美國computer Week的報導,僅僅在i 9 9 9年 i弟一季’病毒就已耗費美國企業成本7 ·According to a report from Computer Week in the United States, the virus has already cost American companies 7 and 9 years ago.
HI 第4頁 Μ 失包括系 成的威脅 上大部分 的病毒, 經發展出 偵測未知 是功能有 大傷害及HI Page 4 Μ Loss includes most of the viruses in the threat. It has been developed to detect unknown functions with major damage and
案號 89123667 五、發明說明(2) 毒所造成的損 毒對企業所照 加大。 現今市面 1 0 0 %已知 毒偵測技術已 程式宣稱可以 防毒軟體可說 個人電腦的重 出一個和傳統不一樣的 為基礎的新技術可以快 病毒。 j *機,破壞資料及中 將隨著網路的普及化而 的防督軟體都宣稱他們 而有报多人因而認為絕 來。但是事實上,即使 病毒,面對未知的新病 限。「我愛你」病毒所 損失就是彳艮好的例子。 病毒偵測方式,這一個 速且有效地偵測出已知 斷生產。病 一年比一年 可以偵測 大部份的病 有一些防毒 毒時現今的 造成企業及 因此我們提 以病毒碼字 及未知的新 現今已經發展出來的各種病毒的偵測技術有病毒比對 法(matchmg virus definition patterns),加總比對 法(check-sum),虛擬機械模擬法(virtual mach^e simulation),即時輸出 / 入掃描(real time 1/〇 ),行為分析法(behavior-based' Virus detection )。 於此,我們將略加介紹。Case No. 89123667 V. Description of the invention (2) The damage caused by poisoning is increasing for enterprises. Nowadays, 100% of the known virus detection technologies have been declared by the program to be anti-virus software. It can be said that a new technology based on a personal computer that is different from the traditional one can fast virus. J * machines, corrupted data, and the defense software of the Lieutenant General with the popularization of the Internet all claimed them, and many people reported that they were absolutely dead. But in fact, even the virus faces unknown new illnesses. The "I love you" virus is a good example. Virus detection method, this one quickly and effectively detects known interrupted production. The disease can be detected year by year. Most diseases can be detected. There are some anti-viruses nowadays causing enterprises and therefore we refer to virus code words and unknown new and currently developed various virus detection technologies. There are virus comparisons. Method (matchmg virus definition patterns), check-sum, virtual machine simulation (virtual mach ^ e simulation), real-time output / input scanning (real time 1 / 〇), behavior analysis (behavior- based 'Virus detection). Here, we will introduce a little bit.
病毒碼是指病毒中一段具有特色或是較為特殊的程式 碼,而這一段程式碼在正常的程式中是不會出現的。當發 現到一個新的病毒時,分析這一個病毒,並且找出一段特 殊的程式碼來建立一個病毒碼的資料庫。當我們掃描一個 樓案疋否遭受病毒感染時,就是比對這一個權案中是否有 與貧料庫中這些已知病毒的特定程式碼一樣。若有,則判 _ K轉案已遭到病毒的感染。大部分市面上的防毒軟Virus code refers to a characteristic or special code in a virus, and this code does not appear in normal programs. When a new virus is found, analyze the virus and find a special code to create a database of virus codes. When we scan a building case for virus infection, we are comparing whether there is the same code in this case as the specific code of these known viruses in the poor library. If so, the _K transfer case has been infected with a virus. Most anti-virus software on the market
第5頁 體都是利用病毒碼比對的 可以準確的偵測出已知病 =種類。然而這種方式無 毒。病毒碼資料庫也須要 速度太快了。當病毒越來 龐大,相對而言掃描的速 加總比對法利用檔案 容利用特定演算法來產生 亚將檢查碼附加在檔案的 庫。利用加總比對法來掃 檔案。利用這種方式來偵 。因為許多的檔案會被使 ’檢查碼也會不一樣,因 大,而且這種方法也無法 .虛擬機械模擬法的技 hlC )病毒,變種(nrntat 種病毒偵測方式主要的缺 出在特定情況下才會發作 4亍為分析法利用偵測 來偵測病毒。賽門鐵克和 此種方法來偵測出其些種 小部份的新病毒。 【發明目的】 主本發明之主要目的係 與系統,用比 :式::測病毒’因為此 毋並且可以正確的判斷出、广^ 法偵測出變種病喜 ^ ^ :吊更新,因為現今病毒 : 越多,病毒碼資料庫也會越t 度也會越來越慢。 越 的長度’建立日期時間及檔 /一個檢查碼(check number), 後面或是建立一個檢查碼的資料 描病毒是根據病毒會改變原來的 測病毒,可以找到大部分的病毒 用者本身修改,並且軟體更新時 此以這種方式來掃毒,誤判率报 測出隱形病毒。 術主要疋用來對多型(polymorp ion)及會自我加密的病毒。此 點為其掃描速度緩慢及無法偵測 的病毒。 電腦中一些不正常的行為及指令 趨勢科技的防毒軟體中,即使用 類的病毒,利用此種方法找出一 提供一種利用病毒碼字過濾電腦 較精簡之病毒碼字即可檢查出一Page 5 The body is compared with the virus code, which can accurately detect the known disease = species. However, this method is non-toxic. The virus pattern database also needs to be too fast. As the virus grows larger, relatively fast scanning and comparison methods use archives to generate specific algorithms to generate sub-codes attached to archives. Scan the archives using the total comparison method. Use this method to detect. Because many files will be different, the check code will be different, because it is large, and this method is not possible. The technology of virtual machine simulation method hlC virus, variant (nrntat virus detection methods are mainly missing in specific cases) Only 4 attacks occur next. The detection method uses detection to detect viruses. Symantec and this method detect some small new viruses. [Objective of the Invention] The main purpose of the present invention is to Compared with the system, use the formula :: test virus' because of this, and can correctly determine and detect the mutation of the disease ^ ^: hanging update, because now more viruses: the more the virus code database will be The greater the degree, the slower it becomes. The longer the length is, 'Create date and time / file / a check number, and later, or create a check code, the data describes that the virus will change the original test virus according to the virus, you can Most of the virus users have found their own modifications, and when the software is updated, they scan the virus in this way, and the false positive rate is reported to detect invisible viruses. This technique is mainly used for polymorphic and self-encrypting diseases. This point is a virus that scans slowly and cannot be detected. Some abnormal behaviors in computers and instructions of Trend Micro's anti-virus software, which use similar viruses, use this method to find a way to provide a virus code word. Filter the computer's more streamlined virus code words to check out one
五、#蘇1^明(4) 病毒及其所有的變形病農 【本案較佳實施例之詳細說$掃毒速度快速之目的 在數據壓縮的領域當中, 資料一些具有代表性的資訊。^子jC〇deW〇rd)是指影像 料,我們可以建立一個碼籙,用這一些具有代表性的資 碼字的資料庫。將這一 &旦C〇deb〇〇k ),即包含複數個 這一些碼字在碼薄中的S二二,數據經過編碼後,只儲存 於本發明中,我達到資料壓縮的目的。 ,組合成為病毒碼字。^為—,病,,將病毒的特徵取出 都具有相同的病毒特徵,::病母及其為數甚多的變形 即可檢查出一病毒及其該病們=要用一病毒碼字 傳統的掃毒方法不同,傳統 主的變形病毒。此點跟 查病毒。而每一變形病毒都右方法用病毒定義碼來檢 一病毒已衍生出七個不同之 二=病毒定義碼,如果某 毒定義碼,況且,曰後若有I,則總共需要八個病 會增加。因此,傳統的病毒掃护=形病毒出現,則數量還 掃描速度緩慢的缺點。另一方=/,具有病毒資料庫龐大及 來快速且大量地合成新的病^我們也可利用病毒碼字 關於本發明,其病毒碼薄^ I縮病毒程式。 令擋型病毒碼薄及巨集數符型(刀兩部份··可執行檔/命 我們將以兩個例子來說明如何』=1 Pt )病毒碼薄。因此, 事。 ^病毒特徵及建構病毒碼 例一:可執行檔及命 我們將病毒特徵稱為毒瑪字 檔/命令檔的病毒元素及行為(或動作圖一列出一些可執行 知道,相同的病毒的行為可 徵)來表現。圖二為寫入用不同的病毒元素(病毒特 一般的程式是不會有這樣的機_磁區及磁碟分割表的程式, 1 00所應對的病毒元素"B9 ‘、、p圖一左攔中之元素索引 般正常的程式是不會去尋抖八 為—病毒特徵,因為一 元素索引100所對應的病毒为割表的。如果-程式包含有 程式包含病毒程式, 素’我們並不能據以判定該 攔之元去去Η丨on Μ 局該私式尚無破壞能力,佝圄-产 欄之凡素索引90所對應的病 仁圖一左V. # 苏 1 ^ 明 (4) Virus and all its deformed farmers [Detailed description of the preferred embodiment of the case The purpose of fast virus scanning speed In the field of data compression, some representative information is provided. ^ JC〇deWrd) refers to video data, we can build a code database, using these representative codeword database. This & den CoDeb 00k), that is, contains a plurality of these codewords in the codebook S, two, after the data is encoded, only stored in the present invention, I achieve the purpose of data compression. , Combined into a virus codeword. ^ For —, disease, the virus features are taken out with the same virus characteristics :: sick mother and its many deformations can detect a virus and the disease = a virus code word traditional Anti-virus methods are different, the traditional primary metamorphosis virus. Check for this at this point. Each variant virus uses the virus definition code to detect a virus. Seven different two have been derived = virus definition code. If a virus definition code is used, and if there is an I in the future, a total of eight illnesses are required. increase. Therefore, the traditional virus scan = the appearance of the virus, the number also scans the disadvantage of slow speed. The other side = /, has a large virus database and can synthesize new diseases quickly and in large quantities. We can also use virus codewords. Regarding the present invention, the virus codebook is thinner than a virus program. Order the virus pattern file and the macro symbol type (the two parts of the knife. Executable file / life) We will use two examples to explain how to "= 1 Pt" virus pattern file. So something. ^ Virus characteristics and construction of virus code Example 1: Executable files and commands We call the virus features virus files and command files with virus elements and behaviors (or action chart 1 lists some executables that know the behavior of the same virus Levy) to perform. Figure 2 shows the writing of different virus elements. (A virus-specific program does not have such a machine_sector and partition table. The virus elements to be dealt with by "100", "B9", p A program with a normal element index in the left block will not look for a virus feature, because the virus corresponding to an element index of 100 is cut off. If the program contains a program and contains a virus program, then we do n’t It ca n’t be judged that the blocked yuan goes to 丨 on Μ round. The private type has no destructive ability.
13”為寫入資料之動作。 f _f4 〇3 ·* *·*·?? CD 引loo和9〇所對應的病毒元辛果:程:已同時包含有元素索 病毒程式,因A該程式將改宜八我們即可判定該牙呈式包含 此,我們可定義〔 1 00, 90〕Α_Λ主I纡貝抖丧失。因 Γ qn 8Π 1 ^ ^ 為一病母碼子。同樣的道理 =0〕表不哥找開機磁區及寫入資料的動 =子。[然,由於實際之可執行播及亦為 字眾多’ i少有數千個或更多, 此一一=病毋碼 (1〇〇, 90)及(80, 90)兩個病毒碼字來說明。牛,僅以 例二含巨集數符型病毒之電子郵件的病毒碼 微軟公司發展了 VBS支援HTML的檔案後,使得電子郵 件及網頁都成了病毒入侵的對象。例如2〇〇〇年年初爆 我愛你電子郵件病毒即是此類的病毒。它利用VB/的、 利性,以驚人的速度利用電子郵件傳播到個人用戶及企業 ’並且造成這些個人及企業體的嚴重損失。 >、 、圖二係使用VBS的電子郵件及網頁的病毒元素。圖四 為偷取通訊錄並散發郵件的程式。很明顯的在圖三左攔之 」一30,20,100,19,14,3〕分別代表之建立outi〇〇k物件、讀 89123667 五、發明說明(6) 取登錄、取得通訊錄、 ^ 中及寄出郵件之六個;7為文子附加至檔案 為任何一程式包含此—、=主為二病毋碼子之典型特徵,因 〔20, 10 0, 14 3 毋碼字即構成病毒行為。關於 由於G。二動,是,能定義為-病毒碼字, 二,〕和〔20, 1 00, 1 9, 1 4〕之不同 m Ml Ur ψ r 迗後,這些檔案仍然會被送出去破 :二=二”單獨就(2。,1〇〇,19,14)這部份而言,亦 種類::二:。攸上面的例+,我們即可了解如何構造各 集合各種病毒::毒;;=丙:碼字f構造後,我們即可 hnnlr,甘A届毋馬子而成為一病毒碼薄(Virus Code- :二V 程式可分為可執行檔型,巨集型,及 婁丈付(S c r 1 p t)型。理兔卜,我柄^ η χ π..^ ^ _上我們必須對各種類型的病毒作 不同的病毋碼溥。於實際情形,數符型病毒亦可包含巨 型病毒程式%,因&我們可將巨集型病#碼薄和數病 毒碼薄合:成為一巨集數符型病毒碼薄。然而,由於實際 之巨集數符型的病毒碼字眾多,至少有數千個或更多,、: 法在此一一列舉,僅以(20, 1 00, 1 9, 1 4)及(3〇, 2〇 ι〇,〇 ,1 9, 1 4,3)兩個病毒碼字來說明。 ’ ,於士發明,病毒碼薄分為兩種:可執行檔/命令槽 型病毋碼薄和巨集數符(s c r i p t )型病毒碼薄。 當完成病毒碼薄的建構以後,我們即可利 碼薄來判斷一樓案是否含有病毒。首先病 〉丙毋 名來判斷一權案是一純文字標,可利用副樓 η』% /命令檐,-旦 5 —或數符(script)lii±jl^,從“土來 第9頁 642999 23667 五、發明說明(7) 判^ 一檔案之類別為熟知 案為一純文丰浐牯θϊ ^此處不再贅述 統的能力,::二 案不具有任何執行破壞電, 。現在游柄我們可以確定它為不具有任何病主電自系 . 5將利用病毒碼字過濾電腦病毒的方法:之文件 • 忒敘述如下 俨/命上入—目檔案從其副檔名判別其檔案類型為可勃/ Ϊ ^ 具有執行巨集功能或數符(hiPt)功^于 案,或純文字檔。 ;功能之檔 •如該檔案為純文字檔,則判定該檔案不主 A右可忒檔案為可執行檔/命令檔,則判別該浐宰曰不 二”執仃/命令檔型病毒碼字。如有,則判定該y、-人否 有病毋,如無,則判定不含病毒。 田案B 如忒檔案為具有可執行巨集/數符功能之栌 邊栎系3有病毋,如無,則判定不含病毒。 5、·,被判定含有病毒之檔案,即被攔截/刪除,否則, 即發送/接收。 田檔案含有病毒時,我們則可攔截/刪除此檔案使 其不此擴散和破壞電腦系統。此一方法流程圖如圖五所示 為進一步揭示本案之具體技術内容,首先參閱圖六。 圖六為本案利用病毒碼字過濾電腦病毒的電腦系統示意圖 。本電腦系統包括:一主機丨,其可連接於一顯示幕2及 /鍵盤3,並有一通信裝置4可與一網際網路5連結。此通 信裝置4可用於接收或發送郵件電腦檔案。 Λ_ 曰 修正 當 檔 第10頁 tjfe 8912366713 ”is the action of writing data. F _f4 〇3 · * * · * · ?? CD cited loo and 90 corresponding virus element Xinguo: Cheng: already contains the element search virus program, because A this program We will determine that the tooth expression contains this. We can define [1 00, 90] Α_Λ main I 纡 jitter loss. Because Γ qn 8Π 1 ^ ^ is a sick mother code. The same reason = 0] My cousin looks for the boot sector and writes data. [Of course, because the actual executable broadcast is also a large number of words, 'I have thousands or fewer, this one = no disease code (100, 90) and (80, 90) two virus codewords to illustrate. Cow, just to take the example 2 virus code of an email containing a macro symbol virus, after Microsoft developed a VBS file that supports HTML E-mail and web pages have become the target of virus invasion. For example, I love you in early 2000. E-mail viruses are such viruses. It uses VB /, which is beneficial and uses electrons at an amazing speed. E-mail spread to individual users and businesses' and caused serious losses to these individuals and businesses. ≫, Figure 2 uses VBS Virus elements of e-mail and web pages. Figure 4 is a program that steals contacts and distributes mail. It is obvious that "30, 20, 100, 19, 14, 3" on the left of Figure 3 represents the establishment of outi〇. 〇k object, read 89123667 V. Description of the invention (6) Six of the registration, address book, ^ and post mail; 7 is a text file attached to the file for any one program including this —, = master is the second disease. The typical characteristics of the code, because [20, 10 0, 14 3 without a code word constitutes a virus behavior. About Since G. Second action, yes, can be defined as-virus codeword, two,] and [20, 1 00, 1 9, 1 4] after m Ml Ur ψ r ,, these files will still be sent out and broken: two = "Two" alone, in terms of (2, 100, 19, 14), also types :: two:. You can understand how to construct various viruses in each collection:: poison; = C: After the code word f is constructed, we can hnnlr, Gan A session without a horse and become a virus codebook (Virus Code-: two V programs can be divided into executable file type, macro type, and Lou Zhangfu ( S cr 1 pt) type. For rabbits, we must treat different types of viruses with different types of diseases. In practice, the number of rune type viruses can also include giant Virus program%, because & we can combine the macro type disease # codebook and the number of virus codebooks: to become a macro number symbol virus codebook. However, due to the large number of virus codewords in the actual macro number There are at least thousands or more: The methods are listed here, only (20, 1 00, 1 9, 1 4) and (3〇, 2〇ι〇, 〇, 19, 1 4 3) Two virus code words Let's explain. ', Yu Shi invented that there are two types of virus codebooks: executable files / command slot disease codebooks and macro virus pattern (script) virus codebooks. After the virus codebooks are constructed, We can use the code to judge whether the first floor case contains the virus. First of all, we must judge whether a right case is a plain text mark, and we can use the auxiliary building η ′% / order eaves,-once 5-or the number sign (script) lii ± jl ^, from "Native page 9 642999 23667 V. Description of the invention (7) Judgment ^ The type of a file is a well-known case is a pure text. 浐 牯 ϊ 不再 ^ I will not repeat the capabilities :: The second case does not have any execution damage electricity. Now we can determine that it does not have any disease main electricity. 5 Methods to filter computer viruses using virus codewords: file • 忒 Description is as follows 俨 / Hit on—the project file judges its file type as Kobo from its file extension. Ϊ It has the function of executing macros or hiPt, or a plain text file. The file of the function • If the file Is a plain text file, it is determined that the file is not the main file. Order file, then determine the "Zaizai Jiujie" "executive / command file type virus code word. If it is, then determine whether the y,-person is sick or not, if not, determine that it does not contain a virus. Field case B such as忒 The file is a genus Quercus spp.3 with executable macro / numerical function. If there is no disease, it is judged to be free of viruses. 5. ·· The files that are judged to contain viruses are blocked / deleted, otherwise, That is, sending / receiving. When the Tian file contains a virus, we can intercept / delete the file to prevent it from spreading and damaging the computer system. The flow chart of this method is shown in Figure 5 to further reveal the specific technical content of the case. First refer to Figure six. Figure 6 is a schematic diagram of a computer system using a virus codeword to filter computer viruses in this case. The computer system includes: a host machine, which can be connected to a display screen 2 and / keyboard 3, and a communication device 4 can be connected to an Internet 5. This communication device 4 can be used for receiving or sending mail computer files. Λ_ Correction when the file page 10 tjfe 89123667
置12 Ϊΐί1包括一處理器U與-儲存裝置12,該儲存〆 電/^ί有一程式碼及至少-電腦病毒碼薄,藉由:上 電恥病毒碼薄中之病毒碼字來二由利用该 毒。該處理主要用1_^斷檔案疋否3有電腦病 兮顯- 來處理電腦病毒偵測。 = 可用來顯示電腦系統執行過程及結果。 腦系使—^ ^ t ^ ^ ^ ΛΛ"/11 式碼。% 一檔案含 2桧案疋否含有病毒之程 此-標案未含電腦病毒,稽m被攔截,刪除。如 本案所揭示者,:較以;:=將被接收/發送。 更或修飾而源於本荦之技術田相種,舉凡局部之變 本案專利權之範脅。綜上所述,本 術特7 、’+段與功㉟,在在顯示其迴異於習知之技 出去f案f特徵在於使用本案所揭示之技術可有效地偵測 , 之斫病毋。本案有實用價值,且具新穎性及進步性 。乎發明專利之要件,懇請貴委並祈早賜 與專利,實感德便。The device 12 includes a processor U and a storage device 12. The storage device has a program code and at least a computer virus codebook. The virus codewords in the virus codebook can be used for two purposes. The poison. This process mainly uses 1_ ^ to break the file, no 3 there is a computer disease. Xi Xian-to deal with computer virus detection. = Can be used to display computer system execution process and results. The brain department makes — ^ ^ t ^ ^ ^ ΛΛ " / 11 code. % A file contains 2 cases, whether it contains a virus or not This-the target case does not contain a computer virus, the inspector was blocked and deleted. As disclosed in this case, ::; = will be received / sent. It may also be modified and originated from the technical field of this species, such as local changes in the scope of patent rights in this case. To sum up, this technical feature 7 and the '+ segment and function are showing that it is different from the conventional technique. The case f is characterized by using the technology disclosed in this case to effectively detect it. This case has practical value, and is novel and progressive. Regarding the essentials of the invention patent, I implore your commission and pray for the early grant of the patent.
第11頁Page 11
【簡單圖示說明】 圖一:可執行檔及命令檔的病毒元素 圖二:感染開機磁區及磁碟分割表的病毒碼 圖三:使用VBS的電子郵件及網頁的病毒元素 圖四:偷取通訊錄並散發郵件的病毒碼 圖五:過濾病毒流程圖 圖六·過滤電腦病毒的電腦糸統 【符號說明】 儲存裝置1 2 通信裝置4 電腦主機1 處理器11 顯示幕2 鍵盤3 網際網路5[Simple icon description] Figure 1: Virus elements of executable file and command file Figure 2: Virus code that infects boot sector and partition table Figure 3: Virus elements of email and webpage using VBS Figure 4: Stealing Take the address book and distribute the virus code Figure 5: Virus filtering flowchart Figure 6 · Computer system for filtering computer viruses [Symbol] Storage device 1 2 Communication device 4 Host computer 1 Processor 11 Display screen 2 Keyboard 3 Internet Road 5
第12頁Page 12
Claims (1)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW89123667A TW542999B (en) | 2000-11-07 | 2000-11-07 | A method and system for filtering computer virus using virus codewords |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW89123667A TW542999B (en) | 2000-11-07 | 2000-11-07 | A method and system for filtering computer virus using virus codewords |
Publications (1)
Publication Number | Publication Date |
---|---|
TW542999B true TW542999B (en) | 2003-07-21 |
Family
ID=29729380
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
TW89123667A TW542999B (en) | 2000-11-07 | 2000-11-07 | A method and system for filtering computer virus using virus codewords |
Country Status (1)
Country | Link |
---|---|
TW (1) | TW542999B (en) |
-
2000
- 2000-11-07 TW TW89123667A patent/TW542999B/en not_active IP Right Cessation
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Spafford | Computer viruses as artificial life | |
Kharraz et al. | Redemption: Real-time protection against ransomware at end-hosts | |
JP3079087B2 (en) | Method and system for generating a macro virus | |
US10417424B2 (en) | Method of remediating operations performed by a program and system thereof | |
US7861300B2 (en) | Method and apparatus for determination of the non-replicative behavior of a malicious program | |
US6973577B1 (en) | System and method for dynamically detecting computer viruses through associative behavioral analysis of runtime state | |
US20060230449A1 (en) | Source code repair method for malicious code detection | |
JP2003196112A (en) | Virus check method for virus check software | |
Spafford | Computer Viruses--A Form of Artificial Life? | |
US20060230289A1 (en) | Source code management method for malicious code detection | |
JP2002342106A (en) | Method for scanning and clearing known and unknown computer virus | |
WO2007056933A1 (en) | A method for identifying unknown virus and deleting it | |
JP2010182019A (en) | Abnormality detector and program | |
US20080222215A1 (en) | Method for Deleting Virus Program and Method to Get Back the Data Destroyed by the Virus | |
US20210182392A1 (en) | Method for Detecting and Defeating Ransomware | |
CN108616510A (en) | It is a kind of that virus detection techniques are extorted based on digital immune reclusion | |
Morales et al. | Identification of file infecting viruses through detection of self-reference replication | |
Morales et al. | Testing and evaluating virus detectors for handheld devices | |
Vasudevan | MalTRAK: Tracking and eliminating unknown malware | |
TW542999B (en) | A method and system for filtering computer virus using virus codewords | |
Zhang | Computer virus and anti-virus technology | |
Gandotra et al. | Malware intelligence: beyond malware analysis | |
JP2010182020A (en) | Illegality detector and program | |
Spafford et al. | A computer virus primer | |
Hsu et al. | Data concealments with high privacy in new technology file system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
GD4A | Issue of patent certificate for granted invention patent | ||
MM4A | Annulment or lapse of patent due to non-payment of fees |