会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明申请
    • METHOD, SYSTEM AND PROGRAM PRODUCT FOR OPTIMIZING EMULATION OF A SUSPECTED MALWARE
    • 用于优化疑似恶意软件的方法,系统和程序产品
    • US20120180132A1
    • 2012-07-12
    • US13424958
    • 2012-03-20
    • Ji Yan Wu
    • Ji Yan Wu
    • G06F21/00
    • G06F21/56G06F21/566
    • A method, system and program product for optimizing emulation of a suspected malware. The method includes identifying, using an emulation optimizer tool, whether an instruction in a suspected malware being emulated by an emulation engine in a virtual environment signifies a long loop and, if so, generating a first hash for the loop. Further, the method includes ascertaining whether the first hash generated matches any long loop entries in a storage and, if so calculating a second hash for the long loop. Furthermore, the method includes inspecting any long loop entries ascertained to find an entry having a respective second hash matching the second hash calculated. If an entry matching the second hash calculated is found, the method further includes updating one or more states of the emulation engine, such that, execution of the long loop of the suspected malware is skipped, which optimizes emulation of the suspected malware.
    • 一种用于优化疑似恶意软件仿真的方法,系统和程序产品。 该方法包括使用仿真优化器工具识别在虚拟环境中由仿真引擎仿真的可疑恶意软件中的指令是否表示长循环,如果是,则生成循环的第一散列。 此外,该方法包括确定生成的第一散列是否匹配存储器中的任何长循环条目,并且如果是这样计算长循环的第二散列。 此外,该方法包括检查确定为找到具有与计算的第二散列匹配的相应第二散列的条目的任何长循环条目。 如果找到与计算的第二散列匹配的条目,则该方法还包括更新仿真引擎的一个或多个状态,使得跳过可疑恶意软件的长循环的执行,这优化了可疑恶意软件的仿真。
    • 3. 发明授权
    • Method, system and program product for optimizing emulation of a suspected malware
    • 方法,系统和程序产品,用于优化疑似恶意软件的仿真
    • US08176477B2
    • 2012-05-08
    • US11855392
    • 2007-09-14
    • Ji Yan Wu
    • Ji Yan Wu
    • G06F9/45G06F11/00
    • G06F21/56G06F21/566
    • A method, system and program product for optimizing emulation of a suspected malware. The method includes identifying, using an emulation optimizer tool, whether an instruction in a suspected malware being emulated by an emulation engine in a virtual environment signifies a long loop and, if so, generating a first hash for the loop. Further, the method includes ascertaining whether the first hash generated matches any long loop entries in a storage and, if so calculating a second hash for the long loop. Furthermore, the method includes inspecting any long loop entries ascertained to find an entry having a respective second hash matching the second hash calculated. If an entry matching the second hash calculated is found, the method further includes updating one or more states of the emulation engine, such that, execution of the long loop of the suspected malware is skipped, which optimizes emulation of the suspected malware.
    • 一种用于优化疑似恶意软件仿真的方法,系统和程序产品。 该方法包括使用仿真优化器工具识别在虚拟环境中由仿真引擎仿真的可疑恶意软件中的指令是否表示长循环,如果是,则生成循环的第一散列。 此外,该方法包括确定生成的第一散列是否匹配存储器中的任何长循环条目,并且如果是这样计算长循环的第二散列。 此外,该方法包括检查确定为找到具有与计算的第二散列匹配的相应第二散列的条目的任何长循环条目。 如果找到与计算的第二散列匹配的条目,则该方法还包括更新仿真引擎的一个或多个状态,使得跳过可疑恶意软件的长循环的执行,这优化了可疑恶意软件的仿真。
    • 8. 发明申请
    • METHOD, SYSTEM AND PROGRAM PRODUCT FOR OPTIMIZING EMULATION OF A SUSPECTED MALWARE
    • 用于优化疑似恶意软件的方法,系统和程序产品
    • US20090077544A1
    • 2009-03-19
    • US11855392
    • 2007-09-14
    • Ji Yan Wu
    • Ji Yan Wu
    • G06F9/445
    • G06F21/56G06F21/566
    • A method, system and program product for optimizing emulation of a suspected malware. The method includes identifying, using an emulation optimizer tool, whether an instruction in a suspected malware being emulated by an emulation engine in a virtual environment signifies a long loop and, if so, generating a first hash for the loop. Further, the method includes ascertaining whether the first hash generated matches any long loop entries in a storage and, if so calculating a second hash for the long loop. Furthermore, the method includes inspecting any long loop entries ascertained to find an entry having a respective second hash matching the second hash calculated. If an entry matching the second hash calculated is found, the method further includes updating one or more states of the emulation engine, such that, execution of the long loop of the suspected malware is skipped, which optimizes emulation of the suspected malware.
    • 一种用于优化疑似恶意软件仿真的方法,系统和程序产品。 该方法包括使用仿真优化器工具识别在虚拟环境中由仿真引擎仿真的可疑恶意软件中的指令是否表示长循环,如果是,则生成循环的第一散列。 此外,该方法包括确定生成的第一散列是否匹配存储器中的任何长循环条目,并且如果是这样计算长循环的第二散列。 此外,该方法包括检查确定为找到具有与计算的第二散列匹配的相应第二散列的条目的任何长循环条目。 如果找到与计算的第二散列匹配的条目,则该方法还包括更新仿真引擎的一个或多个状态,使得跳过可疑恶意软件的长循环的执行,这优化了可疑恶意软件的仿真。
    • 10. 发明授权
    • Method, system and program product for optimizing emulation of a suspected malware
    • 方法,系统和程序产品,用于优化疑似恶意软件的仿真
    • US08473931B2
    • 2013-06-25
    • US13424958
    • 2012-03-20
    • Ji Yan Wu
    • Ji Yan Wu
    • G06F9/45G06F11/00G06F12/14
    • G06F21/56G06F21/566
    • A method, system and program product for optimizing emulation of a suspected malware. The method includes identifying, using an emulation optimizer tool, whether an instruction in a suspected malware being emulated by an emulation engine in a virtual environment signifies a long loop and, if so, generating a first hash for the loop. Further, the method includes ascertaining whether the first hash generated matches any long loop entries in a storage and, if so calculating a second hash for the long loop. Furthermore, the method includes inspecting any long loop entries ascertained to find an entry having a respective second hash matching the second hash calculated. If an entry matching the second hash calculated is found, the method further includes updating one or more states of the emulation engine, such that, execution of the long loop of the suspected malware is skipped, which optimizes emulation of the suspected malware.
    • 一种用于优化疑似恶意软件仿真的方法,系统和程序产品。 该方法包括使用仿真优化器工具识别在虚拟环境中由仿真引擎仿真的可疑恶意软件中的指令是否表示长循环,如果是,则生成循环的第一散列。 此外,该方法包括确定生成的第一散列是否匹配存储器中的任何长循环条目,并且如果是这样计算长循环的第二散列。 此外,该方法包括检查确定为找到具有与计算的第二散列匹配的相应第二散列的条目的任何长循环条目。 如果找到与计算的第二散列匹配的条目,则该方法还包括更新仿真引擎的一个或多个状态,使得跳过可疑恶意软件的长循环的执行,这优化了可疑恶意软件的仿真。