发明名称 Detection of file modifications performed by malicious codes
摘要 File modifications performed by malicious codes are detected by detecting a file modification for an original file before the file modification is performed on the original file. In response to detecting the file modification, a corresponding shadow file is created. The shadow file represents the original file as modified by the file modification. Before allowing the file modification to be performed on the original file, the original file is compared to the shadow file to determine if the file modification is being performed by malicious codes. The file modification may be deemed to be performed by malicious codes when the file modification involves, for example, entry point append, entry point prepend, entry point obfuscation, cavity, overwriting, or mal-tattoo.
申请公布号 US8352522(B1) 申请公布日期 2013.01.08
申请号 US20100873949 申请日期 2010.09.01
申请人 TREND MICRO INCORPORATED;CHENG YI-HUNG 发明人 CHENG YI-HUNG
分类号 G06F12/00;G06F11/00 主分类号 G06F12/00
代理机构 代理人
主权项
地址