Abstract: A verification memory extraction unit (110) extracts a verification memory image (191) from a memory region of a target system. A template memory extraction unit (120) extracts a template memory image (192) from a template system that is not contaminated with malware. An injected code detection unit (130) compares the verification memory image (191) with the template memory image (192) and generates an injected code list (193). An injected code verification unit (140) generates a malicious code list (195) on the basis of the injected code list (193) and a verification rule list (194). A verification result output unit (150) generates a verification result file (196) on the basis of the malicious code list (195).
SOFT COPY ATTACHED IN PDF
| # | Name | Date |
|---|---|---|
| 1 | Power of Attorney [21-03-2016(online)].pdf | 2016-03-21 |
| 2 | Form 5 [21-03-2016(online)].pdf | 2016-03-21 |
| 3 | Form 3 [21-03-2016(online)].pdf | 2016-03-21 |
| 4 | Form 18 [21-03-2016(online)].pdf | 2016-03-21 |
| 5 | Form 1 [21-03-2016(online)].pdf | 2016-03-21 |
| 6 | Drawing [21-03-2016(online)].pdf | 2016-03-21 |
| 7 | Description(Complete) [21-03-2016(online)].pdf | 2016-03-21 |
| 8 | Other Document [27-04-2016(online)].pdf | 2016-04-27 |
| 9 | Marked Copy [27-04-2016(online)].pdf | 2016-04-27 |
| 10 | Form 13 [27-04-2016(online)].pdf | 2016-04-27 |
| 11 | Description(Complete) [27-04-2016(online)].pdf | 2016-04-27 |
| 12 | 201647009726.pdf | 2016-06-08 |
| 13 | 201647009726-Form 1-080416.pdf | 2016-06-23 |
| 14 | 201647009726-Correspondence-080416.pdf | 2016-06-23 |
| 15 | Form 3 [17-08-2016(online)].pdf | 2016-08-17 |
| 16 | Form 3 [26-08-2016(online)].pdf | 2016-08-26 |
| 17 | 201647009726-FER.pdf | 2020-02-21 |
| 1 | search_20-02-2020.pdf |