Computing environment security method and electronic computing system

作者: Jun-Bin Shi , Shu-Fen Yang , Pang-Chieh Wang , Jun-Yu Chen

DOI:

关键词:

摘要: A computing environment security method is provided. The includes: a) dissolving an application package to be tested obtain at least one data set, wherein each set corresponds contents with respect of a plurality aspects the package; and b) evaluating whether repackaged according set. Step (b) c) for analyzing characteristic relationship aspect corresponding accordingly generate set; d) determining search result obtained from database, within distance.

参考文章(24)
Andrew Walenstein, Arun Lakhotia, The Software Similarity Problem in Malware Analysis dagstuhl seminar proceedings. pp. 0- ,(2007)
Wen-Hao Chung, Yu-Jen Lin, Cheng-Peng Kuan, Yun-Ei Wu, Architecture and method of multilayered DRM protection for multimedia service ,(2004)
David W. Palmer, Michael C. Pak, Victor Kouznetsov, Virus scanning on thin client devices using programmable assembly language ,(2001)
Dmitri Alperovitch, Matthew Brinkley, Sven Krasser, System and method for crowdsourcing of mobile application reputations ,(2013)
Udi Manber, Brenda S. Baker, Deducing similarities in Java sources from bytecodes usenix annual technical conference. pp. 15- 15 ,(1998)
Thekkthalackal Varugis Kurien, David B. Cross, Scott A. Field, Software authorization utilizing software reputation ,(2006)
Anthony McKay Lineberry, Ariel Salomon, Daniel Lee Evans, Kyle Barton, David Golombek, James David Burgess, David Luke Richardson, Kevin Patrick Mahaffey, Timothy Micheal Wyatt, System and method for server-coupled malware prevention ,(2011)