A computer file may be scanned for suspicious words 18 occurring within suspicious contexts 20. Thus, messages embedded by malware authors within their malware may be detected. The detection of such embedded messages may be used to identify otherwise unknown items of malware or as a pre-filtering technique for controlling the use of further scanning techniques.

 
Web www.patentalert.com

< Software component model for time sensitive embedded applications

< Mobile application access control list security system

> Apparatus and method for dynamic instrumenting of code to minimize system perturbation

> Method, apparatus, and program to determine the mutability of an object at loading time

~ 00289