SYSTEM AND METHOD OF DETERMINING POTENTIALLY MALICIOUS SOFTWARE BASED ON MONITORING FILE INTEGRITY USING TIME MARKS Russian patent published in 2011 - IPC G06F11/30 G06F12/16 

Abstract RU 2420793 C1

FIELD: information technology.

SUBSTANCE: user application function calls are intercepted before changing the time mark of a file; the record on the number of changes to the time mark of the file made by the application is updated; the record on the number of changes to the time mark of the file made by the application is updated; if possible, the record is stored in the address space of the operating system; upon request of the control application, the record is sent to the application and then compared with information stored in the control application; finally, depending on the comparison result, the corresponding action is taken (for example, the application which modified the file is scanned for viruses) if the record does not correspond to information stored in the control application. The control application contains a data base of the number of changes to the time mark of the file in form of a counter which corresponds to each file.

EFFECT: efficient monitoring of altered files.

4 cl, 11 dwg

Similar patents RU2420793C1

Title Year Author Number
METHOD OF INVOKING SYSTEM FUNCTIONS IN CONDITIONS OF USE OF AGENTS FOR PROTECTING OPERATING SYSTEM KERNEL 2014
  • Yudin Maksim Vitalevich
  • Tarasenko Aleksandr Sergeevich
  • Levchenko Vyacheslav Ivanovich
  • Kumagin Igor Yurevich
RU2585978C2
METHOD FOR DETECTION WORKING MALICIOUS SOFTWARE RUNNED FROM CLIENT, ON SERVER 2015
  • Ovcharik Vladislav Ivanovich
  • Bykov Oleg Grigorevich
RU2617631C2
METHOD OF CREATING A SYSTEM CALL HANDLER 2014
  • Yudin Maksim Vitalevich
  • Tarasenko Aleksandr Sergeevich
  • Levchenko Vyacheslav Ivanovich
  • Kumagin Igor Yurevich
RU2596577C2
METHOD OF DETECTION OF A MALICIOUS FILE USING THE DATABASE OF VULNERABLE DRIVERS 2022
  • Lopatin Evgenii Igorevich
  • Kondratev Dmitrii Andreevich
RU2794713C1
SYSTEM AND METHOD OF PROVIDING SAFETY OF ONLINE TRANSACTIONS 2013
  • Monastyrskij Aleksej Vladimirovich
  • Golovanov Sergej Yurevich
  • Martynenko Vladislav Valerevich
  • Rusakov Vyacheslav Evgenevich
RU2587423C2
SYSTEM AND METHOD OF EXECUTING OPERATING SYSTEM PROCESS REQUESTS TO FILE SYSTEM 2015
  • Levchenko Vyacheslav Ivanovich
  • Sobko Andrej Vladimirovich
  • Manurin Konstantin Yurevich
  • Strogov Vladimir Vladimirovich
RU2610228C1
SYSTEM AND METHOD OF OPENING FILES CREATED BY VULNERABLE APPLICATIONS 2015
  • Efremov Andrej Anatolevich
  • Ladikov Andrej Vladimirovich
  • Solodovnikov Andrej Yurevich
  • Monastyrskij Aleksej Vladimirovich
RU2606883C2
METHOD OF DETECTING UNKNOWN PROGRAMS BY LOAD PROCESS EMULATION 2011
  • Parshin Jurij Gennad'Evich
  • Pintijskij Vladislav Valer'Evich
RU2472215C1
METHOD OF ACCESSING PROCEDURES OF LOADING DRIVER 2014
  • Rusakov Vyacheslav Evgenevich
  • Kirzhemanov Andrej Leonidovich
  • Parshin Yurij Gennadevich
RU2586576C1
SYSTEM AND METHOD OF CHECKING EXECUTABLE CODE BEFORE EXECUTION THEREOF 2012
  • Pavljushchik Mikhail Aleksandrovich
RU2510074C2

RU 2 420 793 C1

Authors

Pavljushchik Mikhail Aleksandrovich

Dates

2011-06-10Published

2010-03-02Filed