摘要 |
Technologies for securing an electronic device may include determining a plurality of rules, monitoring execution of the electronic device, generating a notification that one of the operations has occurred based upon the rules, and, based on the notification and the pattern of the operations, determining whether the operations are indicative of malware. The rules may include an identification of a plurality of entities of the electronic device to be monitored, an identification of one or more operations between the entities to be monitored, and an identification of a pattern of the operations to be monitored. |
主权项 |
1. A system for securing an electronic device, comprising:
a set of malware-access rule logic, comprising:
an identification of a plurality of entities of the electronic device to be monitored;an identification of one or more operations between the entities to be monitored; andan identification of a pattern of the operations to be monitored; and a processor configured to, based upon the set of malware-access rule logic, generate a notification that one of the operations has occurred; an anti-malware module configured to, based on the notification and the pattern of the operations, determine whether the operations are indicative of malware. |