Abstract
Based on real-time catching registry table behaviors of applications, a novel registry table anomaly behaviors detecting technology is proposed. The kernel ideas and detailed implementation methods are described by taking Internet Explore browser for example, and the practical experiments are done. The experimental results prove that this technology is feasible and effective.
| Original language | English |
|---|---|
| Pages (from-to) | 137-139 |
| Number of pages | 3 |
| Journal | Jisuanji Gongcheng/Computer Engineering |
| Volume | 31 |
| Issue number | 8 |
| State | Published - 20 Apr 2005 |
| Externally published | Yes |
Keywords
- Anomaly behaviors detecting
- Malicious script
- Registry table
- Self set
Fingerprint
Dive into the research topics of 'Registry table anomaly behaviors detecting technology for recognizing malicious scripts'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver