摘要 |
A scanning system 1 scans electronic objects for exploits. An object analyser 5 detects objects using various techniques. Some techniques involve detection of a pattern of bytes which is characteristic of a program file of a specific format. Other techniques use statistical fingerprinting.
|