FIELD: information technology.
SUBSTANCE: system and method enable to intercept program requests to secure application projects, analysis thereof for malicious nature and in case of danger, block the request, virtualise application objects and the host system and, depending on the request analysis results, provide a link to the object or virtual copy thereof.
EFFECT: preventing unauthorised access to secure application objects.
16 cl, 10 dwg
Title | Year | Author | Number |
---|---|---|---|
COMPUTER SECURITY SYSTEMS AND METHODS USING ASYNCHRONOUS INTROSPECTION EXCEPTIONS | 2016 |
|
RU2703156C2 |
EVALUATION OF PROCESS OF MALWARE DETECTION IN VIRTUAL MACHINES | 2014 |
|
RU2634205C2 |
COMPLEX CLASSIFICATION FOR DETECTING MALWARE | 2014 |
|
RU2645268C2 |
SYSTEMS AND METHODS FOR PRESENTING A RESULT OF A CURRENT PROCESSOR INSTRUCTION WHEN EXITING FROM A VIRTUAL MACHINE | 2015 |
|
RU2686552C2 |
METHOD OF PROVIDING SAFE EXECUTION OF SCRIPT FILE | 2014 |
|
RU2584507C1 |
MEMORY INTROSPECTION ENGINE FOR PROTECTING INTEGRITY OF VIRTUAL MACHINES | 2014 |
|
RU2640300C2 |
EVENT FILTERING FOR SECURITY APPLICATIONS OF VIRTUAL MACHINES | 2017 |
|
RU2723668C1 |
SYSTEM AND METHODS FOR AUDITING A VIRTUAL MACHINE | 2017 |
|
RU2691187C1 |
METHOD OF DETECTING MALICIOUS FILES THAT COUNTERACT ANALYSIS IN ISOLATED ENVIRONMENT | 2018 |
|
RU2708355C1 |
SYSTEM AND METHOD FOR BLOCKING MALICIOUS ACTIVITY OF LEGITIMATE DRIVERS | 2024 |
|
RU2840426C1 |
Authors
Dates
2012-08-27—Published
2011-06-28—Filed