2022
DOI: 10.1049/tje2.12153
|View full text |Cite
|
Sign up to set email alerts
|

A study on detection and defence of malicious code under network security over biomedical devices

Abstract: With the proliferation of massive varieties and unknown malicious viruses, it is difficult to achieve effective and timely defence by anti‐virus technology with virus signature matching as the core. Hence, the research of malicious code detection and defence is investigated. Firstly, it introduces the defence technology and detection technology. The simulation results show that the default infection probability of the simulation program is 15.1%. The default detection probability is 60.1%, the default number o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 43 publications
0
2
0
Order By: Relevance
“…Literature has proposed and implemented a taint analysis method based on offline indexing of execution traces. Taking bytes as the granularity, the problem of taint loss caused by instant translation execution was described and solved for the first time [15]. Literature has implemented a novel approach to static taint analysis that is accurate and scalable, treating taint analysis as a demand-driven problem that only computes vulnerable information flows instead of computing complete data flow solutions.…”
Section: Related Workmentioning
confidence: 99%
“…Literature has proposed and implemented a taint analysis method based on offline indexing of execution traces. Taking bytes as the granularity, the problem of taint loss caused by instant translation execution was described and solved for the first time [15]. Literature has implemented a novel approach to static taint analysis that is accurate and scalable, treating taint analysis as a demand-driven problem that only computes vulnerable information flows instead of computing complete data flow solutions.…”
Section: Related Workmentioning
confidence: 99%
“…However, physical resources like storage and processing power are heavily taxed by deploying IoT and auxiliary computing. All of these factors contribute to the ineffectiveness of generalized monitoring [4]. A subset of the IoT enables online realtime communication between gadgets by linking up machines and physical objects all over the globe in real time, and this facilitates web administration and dealing with a broad variety of tasks.…”
Section: Introductionmentioning
confidence: 99%