作者: Hatem Eyada
DOI:
关键词: Computer network 、 Code (cryptography) 、 Callback 、 Operability 、 Computer science 、 Malware
摘要: According to one embodiment, a computerized method is directed neutralizing callback malware. This involves intercepting message an endpoint device, where the in response sent from malware operating on device. Thereafter, first portion of information within substituted with second information. The includes code that configured overwrite at least and cause become inoperable or mitigate its operability.