摘要:
An embodiment of the invention provides a method for and an apparatus for classifying a data object by use of a fuzzy hash. The method and apparatus can perform steps including: aligning a window in a target data object; reading content within the window; hashing the content within the window in order to calculate a hash value; splicing a spliced portion from the hashed value; and storing the spliced portion as part of a fuzzy hash.
摘要:
A method of scanning files for malware on a computer system. The method comprises receiving a file to be scanned in the system, and using at least one malware scanning engine to determine whether or not the file possesses properties that are indicative of malware. If it is determined that the file does possess properties that are indicative of malware, then at least one cleanliness scanning engine is used to determine whether or not the file possesses properties that are indicative of a clean file. If it is determined that the file possesses properties that are indicative of a clean file, then a false alarm is signalled.
摘要:
In general, embodiments of the invention relate to systems, methods, and computer program products for previewing, in a safe environment, a given web page that is or may be conducting dangerous or fraudulent activity, including malware distribution and phishing activity. More particularly, embodiments of the invention relate to previewing a given web page in a safe environment by obtaining and breaking down the source code behind the given web page and constructing a preview of the web page without any potentially harmful images, scripts, executables, and/or the like.
摘要:
A data-type management unit (120) include a rules module (230) which includes at least one identification standard (240) paired with an associated code type (250), an interface module (210) configured to receive a code signal, and an analysis module (220) coupled to the interface module (210) and to the rules module (230). Each identification standard (240) includes a comparison rule (310) paired with associated rejection criteria (320). The comparison rule (310) of each identification standard (240) includes at least one code pattern (330) representative of the associated code type (250). The rejection criteria (320) of each identification standard (240) includes at least one rejection rule (340). The analysis module (220) is configured to compare the received code signal to each code pattern (330) in each identification standard (240) and to recognize if one or more of the comparison results violates one or more of the rejection rules (340).
摘要:
The determination of numbers of critical path method calls in an object language application in order to determine an upper limit of the numbers of calls for a critical path method of an object-oriented language application, between two interactions between the application and a user, the application being executed in a calling environment for executing recall methods in response to an external event or an internal event linked to a action-recording method call, a call graph is constructed such that each arc linking a calling method to a called method of the application, and having an action-recording method as a called method is replaced by a set of arcs linking the calling method to various recall methods capable of being triggered in response to the action-recording method call. The upper limit is determined to be the maximum value for the estimated number of critical path method calls for each recall method identified in the call graph.
摘要:
The present invention is directed to a method for indicating if an executable file is malicious, the method comprising the steps of: indicating if the executable file is packed; and if the executable file is packed, determining the executable file as malicious if the executable file satisfies a maliciousness criterion, such as a size less than 200 KB. According to a preferred embodiment of the invention, indicating if the executable file is packed is carried out by the steps of: for at least one section of the file which is not a resource section: compressing at least a part of the section; and indicating that the executable is packed if the compression ratio as a result of the compressing is less than a threshold (e.g., about 10 percent).
摘要:
Detection and management methods and apparatus for wireless devices (102) may include an executable instruction authorization module (114) operable to scan executable instructions on a wireless device, generate a log (120) indicative of a virus or otherwise unauthorized executable instructions based on a received authorization configuration (118), and forward the log to a user manager (108). The user manager may be operable to analyze the log and generate an authorization report (154) which may be viewable by an operator to determine the disposition of unauthorized executable instructions At least one of the executable instruction authorization module, the user manager, and the operator may be operable to generate a control command operable to delete, or otherwise disable, unauthorized executable instructions on the wireless device, or to restore the executable instructions on the wireless device
摘要:
A method and system for performing securing and controlling of a network using content identification of files in a network having a central infrastructure and local computing devices is presented. The method comprises calculating a hash value of a new file created or received on a local computing device, transmitting the hash value to the central infrastructure, comparing the hash value with a previously determined hash value stored in a database on the central infrastructure to determine whether the file is new to the network and if the file is new to the network, checking the file content with a content identifying engine, installed and updated on the central infrastructure. Content attributes are determined for the files which allow to perform appropriate actions on the local computing devices according to policy rules.
摘要:
A method to deobfuscate a source code (S1) using a computer device (4), comprises steps of obtaining, based on the source code (S1) to be deobfuscated, a representation of the source code (A), the source code (S1) comprising at least one of static constructs and dynamic constructs, and deobfuscating, by a deobfuscation unit (1) of the computer device (4), the source code (S1) using the representation of the source code (A). Herein, said deobfuscating includes: examining, by the deobfuscation unit (1), in a detection step (10) the representation of the source code (A) to detect at least one static construct within the representation of the source code (A); if at least one static construct is detected in the representation of the source code (A), modifying, by the deobfuscation unit (1), in a modification step (11, 12) the at least one static construct according to a predefined ruleset (110, 120) to obtain a modified representation of the source code (A); and outputting, based on the modified representation of the source code (A), the deobfuscated source code (S2). In this way a method is provided to deobfuscate a source code using a computer device which allows for a reliable and automatic deobfuscation of a sample of a source code.