概述了IE二进制行为组件的工作原理,根据其COM接口原始语义,针对。
This paper presents the basic principle of IE binary behaviors, and redefines the COM interfaces according to their primary semantics and the feature of .
图1给出静态分析二进制代码检查恶意行为的图示。
Figure1 gives a diagrammatic representation of the steps in analysing a binary statically for the presence of malicious behaviour.
这保证了文件传输的应用程序,检查附近的一个文件的开始数据来确定是否将文件的内容作为文本或二进制适当的行为。
This ensures proper behaviour of file transfer applications that inspect data near the beginning of a file to determine whether to treat the file's contents as text or as binary.
当它与入侵检测系统联用时,关于恶意软件的行为、数据包捕获和恶意二进制文件本身这些有价值的信息就可以被获得。
When used in conjunction with an Intrusion Detection System, valuable information about the behavior of the malware, packet captures and the malware binary itself may be obtained.
当它与入侵检测系统联用时,关于恶意软件的行为、数据包捕获和恶意二进制文件本身这些有价值的信息就可以被获得。
When used in conjunction with an Intrusion Detection System, valuable information about the behavior of the malware, packet captures and the malware binary itself may be obtained.
应用推荐