| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN2009102140119ACN101710375B (en) | 2009-12-16 | 2009-12-16 | Anti-viral device in anti-viral software and anti-viral method thereof |
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN2009102140119ACN101710375B (en) | 2009-12-16 | 2009-12-16 | Anti-viral device in anti-viral software and anti-viral method thereof |
| Publication Number | Publication Date |
|---|---|
| CN101710375Atrue CN101710375A (en) | 2010-05-19 |
| CN101710375B CN101710375B (en) | 2013-01-23 |
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN2009102140119AExpired - Fee RelatedCN101710375B (en) | 2009-12-16 | 2009-12-16 | Anti-viral device in anti-viral software and anti-viral method thereof |
| Country | Link |
|---|---|
| CN (1) | CN101710375B (en) |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN102893580A (en)* | 2012-07-04 | 2013-01-23 | 华为技术有限公司 | Anti-virus method and device and firewall equipment |
| CN104134039A (en)* | 2014-07-24 | 2014-11-05 | 北京奇虎科技有限公司 | Virus checking and killing method, virus checking and killing client, virus checking and killing server and virus checking and killing system |
| CN104850782A (en)* | 2014-02-18 | 2015-08-19 | 腾讯科技(深圳)有限公司 | Method and device for matching virus characteristics |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5359659A (en)* | 1992-06-19 | 1994-10-25 | Doren Rosenthal | Method for securing software against corruption by computer viruses |
| US7603712B2 (en)* | 2005-04-21 | 2009-10-13 | Microsoft Corporation | Protecting a computer that provides a Web service from malware |
| CN101320413A (en)* | 2007-06-07 | 2008-12-10 | 李武 | Anti-virus device for mobile memory and its anti-virus method |
| CN101441687B (en)* | 2007-11-21 | 2010-07-14 | 珠海金山软件股份有限公司 | Method and apparatus for extracting virus characteristic of virus document |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN102893580A (en)* | 2012-07-04 | 2013-01-23 | 华为技术有限公司 | Anti-virus method and device and firewall equipment |
| CN104850782A (en)* | 2014-02-18 | 2015-08-19 | 腾讯科技(深圳)有限公司 | Method and device for matching virus characteristics |
| WO2015124086A1 (en)* | 2014-02-18 | 2015-08-27 | Tencent Technology (Shenzhen) Company Limited | Virus signature matching method and apparatus |
| US10114951B2 (en) | 2014-02-18 | 2018-10-30 | Tencent Technology (Shenzhen) Company Limited | Virus signature matching method and apparatus |
| CN104850782B (en)* | 2014-02-18 | 2019-05-14 | 腾讯科技(深圳)有限公司 | Match the method and device of virus characteristic |
| CN104134039A (en)* | 2014-07-24 | 2014-11-05 | 北京奇虎科技有限公司 | Virus checking and killing method, virus checking and killing client, virus checking and killing server and virus checking and killing system |
| Publication number | Publication date |
|---|---|
| CN101710375B (en) | 2013-01-23 |
| Publication | Publication Date | Title |
|---|---|---|
| Qian et al. | {RAZOR}: A framework for post-deployment software debloating | |
| Yan et al. | Understanding the performance of webassembly applications | |
| Hu et al. | Binary code clone detection across architectures and compiling configurations | |
| Wang et al. | Ramblr: Making Reassembly Great Again. | |
| CN103324872B (en) | Based on the guard method of Android application program and the system of order confusion | |
| CN106096338B (en) | A kind of virtualization software guard method obscured with data flow | |
| US8726255B2 (en) | Recompiling with generic to specific replacement | |
| Yadavalli et al. | Raising binaries to llvm ir with mctoll (wip paper) | |
| CN104134039B (en) | Checking and killing virus method, client, server and checking and killing virus system | |
| Liu et al. | Exploring missed optimizations in webassembly optimizers | |
| Jung et al. | B2R2: Building an efficient front-end for binary analysis | |
| CN101710375B (en) | Anti-viral device in anti-viral software and anti-viral method thereof | |
| CN105303072A (en) | ART mode based software hardening method and apparatus | |
| CN102841844A (en) | Method for binary code vulnerability discovery on basis of simple symbolic execution | |
| Engelke et al. | Instrew: Leveraging LLVM for high performance dynamic binary instrumentation | |
| CN101339519B (en) | Soft and hard combined control stream checking method facing to embedded microprocessor | |
| Liu et al. | Decompiling x86 deep neural network executables | |
| US9098355B2 (en) | Method and apparatus for substituting compiler built-in helper functions with machine instructions | |
| Fu et al. | Improving SIMD code generation in QEMU | |
| CN110147238A (en) | A kind of program compiling method, apparatus and system | |
| CA2820058A1 (en) | Multi-modal compiling apparatus and method for generating a hybrid codefile | |
| Cifuentes et al. | Computer security analysis through decompilation and high-level debugging | |
| CN115756480A (en) | An Android application reinforcement method, system and device | |
| Shapiro et al. | {“Weird}{Machines”} in {ELF}: A spotlight on the underappreciated metadata | |
| CN107341403B (en) | A file conversion method and device |
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| C14 | Grant of patent or utility model | ||
| GR01 | Patent grant | ||
| ASS | Succession or assignment of patent right | Owner name:BEIKE INTERNET (BEIJING) SECURITY TECHNOLOGY CO., Free format text:FORMER OWNER: ZHUHAI JUNTIAN ELECTRONICS TECHNOLOGY CO., LTD. Effective date:20140704 Owner name:BEIJING GOLDEN HILL NETWORK TECHNOLOGY CO., LTD. K Effective date:20140704 | |
| C41 | Transfer of patent application or patent right or utility model | ||
| COR | Change of bibliographic data | Free format text:CORRECT: ADDRESS; FROM: 519015 ZHUHAI, GUANGDONG PROVINCE TO: 100041 SHIJINGSHAN, BEIJING | |
| TR01 | Transfer of patent right | Effective date of registration:20140704 Address after:100041 Beijing, Shijingshan District Xing Xing street, building 30, No. 3, building 2, A-0071 Patentee after:SHELL INTERNET (BEIJING) SECURITY TECHNOLOGY Co.,Ltd. Patentee after:BEIJING KINGSOFT NETWORK TECHNOLOGY Co.,Ltd. Patentee after:BEIJING KINGSOFT INTERNET SECURITY SOFTWARE Co.,Ltd. Patentee after:CONEW NETWORK TECHNOLOGY (BEIJING) Co.,Ltd. Patentee after:ZHUHAI JUNTIAN ELECTRONIC TECHNOLOGY Co.,Ltd. Address before:Jinshan computer Building No. 8 Jingshan Hill Road, Lane 519015 Lianshan Jida Zhuhai city in Guangdong Province Patentee before:Zhuhai Juntian Electronic Technology Co.,Ltd. | |
| CF01 | Termination of patent right due to non-payment of annual fee | Granted publication date:20130123 Termination date:20191216 | |
| CF01 | Termination of patent right due to non-payment of annual fee |