首页> 外文会议>5th annual workshop on cyber security and information intelligence research 2009 >Computing the behavior of malicious code with function extraction technology
【24h】

Computing the behavior of malicious code with function extraction technology

机译:使用功能提取技术计算恶意代码的行为

获取原文

摘要

Modern society is irreversibly dependent on computer-based infrastructure systems of astonishing scope and complexity. Yet these systems are increasingly vulnerable to disabling intrusions by adversaries equipped with the knowledge and resources to mount sophisticated attacks [1, 2]. Technical and organizational preparation for major attacks is essential to national security. Preparation takes time and effort, and when a major attack occurs, it is too late to prepare. Preparation must provide capability for fast and precise analysis of the technical structure of an attack as a basis for fast response to limit damage and deploy countermeasures.
机译:现代社会不可逆转地依赖范围和复杂性惊人的基于计算机的基础架构系统。然而,这些系统越来越容易受到装备有知识和资源以进行复杂攻击的对手的破坏性入侵的攻击[1,2]。为重大攻击做好技术和组织准备对于国家安全至关重要。准备工作需要花费时间和精力,当发生重大攻击时,准备工作为时已晚。准备工作必须提供对攻击的技术结构进行快速而准确的分析的能力,以此作为快速响应以限制损害和部署对策的基础。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号