FIELD: information technology.
SUBSTANCE: in one implementation, a trusted operating environment, which may include a trusted operating system and a trusted antivirus tool, may be embodied on a removable data medium. The computing device is then booted from the removable data medium using the trusted operating system. The trusted antivirus tool searches for virus signature updates on the computing device and uses the trusted operating system to scan the computing device for malware. In another implementation, the computing device is booted from a trusted operating system on a removable device, and the trusted antivirus tool on the removable device scans the computing device for malware. The removable device may update its own internal components (e.g., virus signatures and the antivirus tool) by searching for updates on the computing device or a remote resource and by authenticating any updates detected.
EFFECT: high efficiency of malware detection.
19 cl, 6 dwg
Title | Year | Author | Number |
---|---|---|---|
METHOD FOR FASTER FULL ANTIVIRUS SCANNING OF FILES ON MOBILE DEVICE | 2019 |
|
RU2726878C1 |
METHOD FOR SELECTIVE REPEATED ANTIVIRUS SCANNING OF FILES ON MOBILE DEVICE | 2019 |
|
RU2726877C1 |
METHOD FOR EXCLUDING PROCESSES OF ANTIVIRUS SCANNING ON THE BASIS OF DATA ON FILE | 2015 |
|
RU2595510C1 |
DECLARATION-BASED CONTENT REPUTATION SERVICE | 2011 |
|
RU2573760C2 |
METHOD OF DETECTING UNKNOWN PROGRAMS BY LOAD PROCESS EMULATION | 2011 |
|
RU2472215C1 |
METHOD FOR ANTI-VIRUS RECORDS TRANSMISSION USED TO DETECT MALICIOUS FILES | 2015 |
|
RU2614929C1 |
SYSTEM AND METHOD OF FORMATION OF ANTI-VIRUS RECORDS USED TO DETECT MALICIOUS FILES ON USER'S COMPUTER | 2015 |
|
RU2617654C2 |
SYSTEM AND METHOD OF PROTECTING COMPUTING DEVICE FROM MALICIOUS OBJECTS USING COMPLEX INFECTION SCHEMES | 2011 |
|
RU2454705C1 |
METHOD FOR AUTOMATIC ADJUSTMENT OF SECURITY MEANS | 2012 |
|
RU2514137C1 |
SYSTEM AND METHOD OF DETECTING THE HARMFUL CODE IN THE ADDRESS PROCESS SPACE | 2017 |
|
RU2665910C1 |
Authors
Dates
2013-01-20—Published
2008-05-02—Filed