作者: Christoph Cornelius Michael
DOI:
关键词: Windows NT 、 Event (computing) 、 Heuristic analysis 、 Operating system 、 Malware 、 Automation 、 Instrumentation (computer programming) 、 Reading (computer) 、 Real-time computing 、 Computer science 、 Finite-state machine
摘要: A system and method by which novel, malicious execution traces may be detected applying a combination of finite automation heuristic analysis techniques. Such obtained instrumenting system-level operating calls, as well other techniques, such as, but not limited to, reading error log files, Windows NT event logs. With proper instrumentation, known good programs run their monitored. From monitoring, model derived, can indicate those typically associated with software. this information, novel invoke similar to detected, stopped before significant damage occur.