AUTOMATIC DETECTION OF VULNERABLE FILES AND INSTALLATION PATCHES ON THEM Russian patent published in 2009 - IPC G06F21/00 

Abstract RU 2358313 C2

FIELD: physics; computer engineering.

SUBSTANCE: present invention relates to computer engineering and can be used for protecting binary program files. In the invention description is given of a system and method which enable installation of security patches (on weak points) in binary files. Detection and installation of patches on vulnerable binary files is automatic, reliable, and free from worsening and exhaustion in networks of unlimited size. Reliable detection of vulnerable binary files (for example, in operation systems, application programs etc) is achieved through use of binary signatures, which are related to the detected vulnerabilities. Distinction of security patches from ordinary service packs provides for possibility of making patches which do not worsen vulnerability in binary files.

EFFECT: provision for reliable detection of vulnerable binary files and making patches which do not worsen vulnerability in binary files.

24 cl, 7 dwg

Similar patents RU2358313C2

Title Year Author Number
PROTECTION FROM EXPLOITATION OF SOFTWARE VULNERABILITY 2007
  • Tompson Rodzher Dzhon
  • Mosher Gregori Ehndrju
RU2417429C2
METHOD AND SYSTEM FOR IMPROVING SECURITY OF ELECTRONIC INTERNET TRANSACTIONS 2012
  • Gruzdev Sergej L'Vovich
RU2519503C1
METHOD AND SYSTEM FOR LIMITING SOFTWARE UPDATE 2005
  • Gunjakti Kaglar
  • Khatlelid Krist'Jan Ehrik
RU2375739C2
TAG-BASED SCHEMA FOR DISTRIBUTING UPDATE METADATA IN UPDATE DISTRIBUTION SYSTEM 2005
  • Averbukh Aaron G.
  • Marl Dehnnis Krehjg
  • Dehgkhehn Dehvid B.
  • Menzis Dehrek P.
  • Fisher Dzhinett R.
  • Shepard Mark
  • Khang Seong Kook
RU2378686C2
TRUSTED ENVIRONMENT FOR MALWARE DETECTION 2008
  • Kkhilnani Reshma
  • Iverson Kristofer N.
RU2473122C2
DYNAMIC REPUTATION INDICATOR FOR OPTIMIZATION OF COMPUTER SECURITY OPERATIONS 2017
  • Hajmasan Gheorghe-Florin
  • Mondoc Alexandra
  • Portase Radu-Marian
RU2723665C1
METHOD FOR IDENTIFYING INFORMATION SECURITY THREATS (OPTIONS) 2023
  • Sergeev Viktor Gennadevich
  • Skablonskii Andrei Vadimovich
  • Vorontsov Dmitrii Viktorovich
  • Spravtsev Iurii Vladimirovich
RU2802539C1
TRUSTED ENTITY BASED ANTI-CHEATING MECHANISM 2010
  • Rehj Kennet D.
  • Alkouv Dzhejms M.
  • Makmajkl Lonni Din
  • L'Juis Natan T.
  • Shnell' Patrik
RU2541879C2
SYSTEM AND METHOD FOR STATIC ANALYSIS OF EXECUTABLE BINARY CODE AND SOURCE CODE USING FUZZY LOGIC 2021
  • Chernov Daniil Vladimirovich
RU2783152C1
REPUTATION-BASED AUTHORISATION DECISIONS 2007
  • Kross Dehvid B.
  • Fild Skott A.
  • Kurien Varugis
RU2458393C2

RU 2 358 313 C2

Authors

Ivanov Oleg

Ivanov Sergej

Dates

2009-06-10Published

2004-06-22Filed