Invention Grant
US07743418B2 Identifying malware that employs stealth techniques 有权
识别使用隐身技术的恶意软件

Identifying malware that employs stealth techniques
Abstract:
A method, software system, and computer-readable medium are provided for determining whether a malware that implements stealth techniques is resident on a computer. In one exemplary embodiment, a method is provided that obtains a first set of data that describes the processes that are reported as being active on the computer in a non-interrupt environment. Then, the method causes program execution to be interrupted at runtime so that an analysis of the active processes on the computer may be performed. After program execution is interrupted, a second set data that describes the processes that are reported as being active on the computer in a interrupt environment is obtained. By performing a comparison between the first and second sets of data, a determination may be made regarding whether the collected data contains inconsistencies that are characteristic of malware.
Public/Granted literature
Information query
Patent Agency Ranking
0/0