Oracle Corporation
Detecting malicious code embedded in documents

Last updated:

Abstract:

A method for analyzing a document may include obtaining a runtime model for an application used to process the document, extracting, from the document, code blocks each including statements, and generating, using the runtime model, a result including a series of abstract states for each statement of a code block. Each abstract state may include a series of abstract values each corresponding to concrete values. The method may further include determining, using the result and the runtime model, whether the document includes potentially malicious code.

Status:
Grant
Type:

Utility

Filling date:

28 Nov 2017

Issue date:

19 May 2020