首页> 外国专利> TECHNIQUE FOR DETERMINING A MALIGN OR NON-MALIGN BEHAVIOR OF AN EXECUTABLE FILE

TECHNIQUE FOR DETERMINING A MALIGN OR NON-MALIGN BEHAVIOR OF AN EXECUTABLE FILE

机译:确定可执行文件的恶意或非恶意行为的技术

摘要

A technique for determining a malign or non-malign behavior of an executable file is disclosed. In a first method aspect, the method comprises the steps of first acquiring a first behavior profile of the executable file, the first behavior profile comprising a first observable execution trace of the executable file from an emulated environment, second acquiring a second behavior profile of the executable file, the second behavior profile comprising a second observable execution trace of the executable file from a real environment, and comparing the first and second observable execution traces so as to determine the malign or non-malign behavior of the executable file. In another method aspect, the method comprises the steps of receiving a trigger condition, collecting, responsive to the trigger condition, first and second behavior profiles of the executable file from first and second one of two or more file-execution devices, the first and second behavior profiles comprising first and second observable execution traces of the executable file, and the first and second observable execution traces being non-mapped to the first and second file-execution device, respectively.
机译:公开了一种用于确定可执行文件的恶意或非恶意行为的技术。在第一方法方面,该方法包括以下步骤:首先获取可执行文件的第一行为概况,该第一行为概况包括来自仿真环境的可执行文件的第一可观察到的执行轨迹,其次,获取可执行文件的第二行为概况。可执行文件,第二行为简档包括来自真实环境的可执行文件的第二可观察执行迹线,并比较第一和第二可观察执行迹线以便确定可执行文件的有害或非有害行为。在另一个方法方面,该方法包括以下步骤:接收触发条件,响应于该触发条件,从两个或更多个文件执行设备的第一和第二设备中的第一和第二设备,第一和第二设备收集可执行文件的第一和第二行为配置文件。第二行为简档包括可执行文件的第一和第二可观察到的执行轨迹,并且第一和第二可观察到的执行轨迹分别未映射到第一和第二文件执行设备。

著录项

相似文献

  • 专利
  • 外文文献
  • 中文文献
获取专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号