A detecting method and architecture thereof for malicious codes is
provided, which is applicable to a computer system having at least a
host. Each host executes at least a process. The method is implemented
with a system call interposition module and an analysis module for
malicious codes. The system call module intercepts all system calls of
process calls and all related arguments of the system calls. The analysis
module for malicious codes analyzes the input data of pre-determined
system calls, and executes the suspicious malicious codes. Once the same
behaviors between the analysis module and the suspicious malicious codes
are found, a system-intrusion warning is immediately triggered. The
method is not required to maintain huge signature databases, and can
detect unknown attack-skills in a manner of high correct rate and low
incorrect ruling.