首页> 外国专利> MONITORING EXECUTED SCRIPT FOR ZERO-DAY ATTACK OF MALWARE

MONITORING EXECUTED SCRIPT FOR ZERO-DAY ATTACK OF MALWARE

机译:监控恶意脚本零日攻击的执行脚本

摘要

Embodiments are directed to hooking a call for a malware monitoring logic into a JavaScript API engine interpreter. Upon JavaScript being placed into heap memory, the malware monitoring logic can initiate an evaluation or analysis of the heap spray to determine whether the JavaScript includes malware or other malicious agents prior to execution of the JavaScript shell code. Upon execution of the JavaScript within the sandbox, the malware monitoring logic can initiate monitoring of the JavaScript using malware analysis and/or execution profiling techniques. Inferences can be made of the presence of malware based on a start and end time of the JavaScript execution.
机译:实施例旨在将对恶意软件监视逻辑的调用挂接到JavaScript API引擎解释器中。将JavaScript放入堆内存后,恶意软件监视逻辑可以在执行JavaScript Shell代码之前启动对堆喷射的评估或分析,以确定JavaScript是否包括恶意软件或其他恶意代理。在沙盒中执行JavaScript后,恶意软件监视逻辑可以使用恶意软件分析和/或执行配置技术启动对JavaScript的监视。可以根据JavaScript执行的开始时间和结束时间来推断是否存在恶意软件。

著录项

相似文献

  • 专利
  • 外文文献
  • 中文文献
获取专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号