Countering polymorphic malicious computer code through code optimization
Methods, apparati, and computer-readable media for determining whether computer code contains malicious code. In a method embodiment, the computer code is optimized to produce optimized code; and the optimized code is subject to a malicious code detection protocol. In an embodiment, the optimizing c...
Saved in:
Main Author | |
---|---|
Format | Patent |
Language | English |
Published |
24.11.2009
|
Online Access | Get full text |
Cover
Summary: | Methods, apparati, and computer-readable media for determining whether computer code contains malicious code. In a method embodiment, the computer code is optimized to produce optimized code; and the optimized code is subject to a malicious code detection protocol. In an embodiment, the optimizing comprises at least one of constant folding, copy propagation, non-obvious dead code elimination, code motion, peephole optimization, abstract interpretation, instruction specialization, and control flow graph reduction. |
---|