Systems and methods for locating malware

作者: Spencer Smith , Adam Glick , Nicholas Graf

DOI:

关键词:

摘要: A computer-implemented method for locating malware may include identifying a malicious behavior in computing system. The also determining that the arises from set of interrelated executable objects. further an object recently added to additionally attributing based on when was performing security action object. Various other methods, systems, and computer-readable media are disclosed.

参考文章(9)
Robert Bisso, Edward Schaefer, Anthony Blumfield, Malware detention for suspected malware ,(2008)
Moshe Matitya, Amit Shaked, Artem Melnick, Alexander Yermakov, Moshe Rubin, Shlomo Touboul, Method and system for adaptive rule-based content scanners for desktop computers ,(2004)
Carey S. Nachenberg, William E. Sobel, Temporal access control for computer virus prevention ,(2002)
Oded Cohen, Yanki Margalit, Dany Margalit, Method for protecting a computer from suspicious objects ,(2004)
Zhuowei Li, XiaoFeng Wang, Zhenkai Liang, Michael K. Reiter, AGIS: Towards automatic generation of infection signatures dependable systems and networks. pp. 237- 246 ,(2008) , 10.1109/DSN.2008.4630092
William Dale Andruss, Bruce David Leetch, Christopher Hercules Claudatos, Steven R. Terwilliger, Differential virus scan ,(2006)