主权项 |
1. A computer implemented method comprising:
identifying, by a computing device, an invalid field of a portable executable file; determining, by the computing device, a likelihood of repairing the invalid field of the portable executable file; generating, by the computing device, a repair model for repairing the invalid field of the portable executable file; and repairing, by the computing device, the invalid field of the portable executable file based upon, at least in part, the repair model, wherein repairing the invalid field of the portable executable file includes correcting the invalid field of the portable executable file via one or more algorithms; wherein generating the repair model includes generating the repair model based upon one or more empirically derived rules, wherein the one or more empirically derived rules include calculations to correct the invalid field based upon, at least in part, previous errors and whether the previous errors were repaired to obtain an executable file, wherein the one or more empirically derived rules are based upon, at least in part, a comparison between different operating system versions and how the different operating system versions process the portable executable file. |