摘要 |
<p>Systems and methods are provided for security detection. For example, an initiation module in a process that initiates a sensitive operation is determined; identification information of the initiation module is collected; and security of the sensitive operation is detected based on at least information associated with the collected identification information and a predetermined database.</p> |