Full metadata record
DC FieldValueLanguage
dc.contributor.authorWang Chi-weien_US
dc.contributor.authorChen Chong-kuanen_US
dc.contributor.authorWang Chia-weien_US
dc.contributor.authorShieh Shiuhpyngen_US
dc.date.accessioned2015-12-04T07:03:12Z-
dc.date.available2015-12-04T07:03:12Z-
dc.date.issued2015-08-27en_US
dc.identifier.govdocG06F021/56zh_TW
dc.identifier.urihttp://hdl.handle.net/11536/128685-
dc.description.abstractA method for determining whether a to-be-tested program contains malicious behavior is disclosed. The method includes steps of providing an emulator having a kernel and a plurality of installed hook points, wherein the kernel has a plurality of in-kernel functions; executing the to-be-tested program in the emulator dynamically to invoke the plurality of installed hook points to obtain a specific in-kernel function set from the plurality of in-kernel functions; and determining whether the to-be-tested program contains instructions for malicious behavior based on an invocation sequence of the specific in-kernel function set.zh_TW
dc.language.isozh_TWen_US
dc.titleMETHOD OF GENERATING IN-KERNEL HOOK POINT CANDIDATES TO DETECT ROOTKITS AND THE SYSTEM THEREOFzh_TW
dc.typePatentsen_US
dc.citation.patentcountryUSAzh_TW
dc.citation.patentnumber20150242626zh_TW
Appears in Collections:Patents