发明名称 |
IDENTIFICATION OF OBFUSCATED COMPUTER ITEMS USING VISUAL ALGORITHMS |
摘要 |
A method to identify character strings associated with potentially malicious software items. The method includes employing a visual algorithm to translate one or more characters of a character string into corresponding characters in a visual ID for use in grouping and comparing computer items having similar visual IDs, such as a reference ID for a computer item that is known to be non-malicious. The method may, among other things, elucidate an attacker's attempt to obfuscate malicious software by using file names that are very similar to those used for harmless files. |
申请公布号 |
US2014189866(A1) |
申请公布日期 |
2014.07.03 |
申请号 |
US201313969879 |
申请日期 |
2013.08.19 |
申请人 |
Shiffer Jason;Ross David |
发明人 |
Shiffer Jason;Ross David |
分类号 |
G06F21/56 |
主分类号 |
G06F21/56 |
代理机构 |
|
代理人 |
|
主权项 |
1. A method to identify one or more items associated with a computer, the method comprising the steps of:
initiating a visual algorithm in a computer, the visual algorithm including a set of executable computer instructions configured to cause (i) consumption of a character string in the computer, and (ii) generation of a visual ID based on the character string; and generating a first visual ID by applying the visual algorithm to a candidate character string. |
地址 |
Vienna VA US |