METHOD OF EMULATING SYSTEM FUNCTION CALLS FOR EVADING EMULATION COUNTERMEASURES Russian patent published in 2014 - IPC G06F21/00 

Abstract RU 2514141 C1

FIELD: physics, computer engineering.

SUBSTANCE: invention relates to methods of emulating system function calls for evading emulation countermeasures. The result is achieved through a method of emulating system function calls to evade emulation countermeasures, the method comprising the following steps: obtaining an executable file at the input of an emulator; verifying conditions of system function call emulation requirements; if at least one of the above-mentioned conditions is satisfied, using system call emulation; emulating execution of the executable file according to successive execution of instructions; upon detecting a system function call, switching the emulation process to system call emulation; performing system function call emulation in form of a chain of low-level calls.

EFFECT: facilitating system function call emulation.

8 cl, 6 dwg, 1 tbl

Similar patents RU2514141C1

Title Year Author Number
EMULATOR AND METHOD FOR EMULATION 2020
  • Pintijskij Vladislav Valerevich
  • Anikin Denis Vyacheslavovich
  • Kirsanov Dmitrij Aleksandrovich
  • Trofimenko Sergej Vladimirovich
RU2757409C1
SYSTEM AND METHOD OF STORAGE OF EMULATOR STATE AND ITS FURTHER RECOVERY 2013
  • Pintijskij Vladislav Valer'Evich
  • Belov Sergej Jur'Evich
RU2553056C2
METHOD FOR ENHANCEMENT OF OPERATIONAL EFFICIENCY OF HARDWARE ACCELERATION OF APPLICATION EMULATION 2012
  • Belov Sergej Jur'Evich
RU2514142C1
METHOD OF DETECTING MALICIOUS EXECUTABLES, CONTAINING INTERPRETER, BY COMBINING EMULATORS 2015
  • Zakorzhevskij Vyacheslav Vladimirovich
  • Vinogradov Dmitrij Valerevich
  • Pintijskij Vladislav Valerevich
  • Kirsanov Dmitrij Aleksandrovich
RU2622627C2
METHOD OF DETECTING UNKNOWN PROGRAMS BY LOAD PROCESS EMULATION 2011
  • Parshin Jurij Gennad'Evich
  • Pintijskij Vladislav Valer'Evich
RU2472215C1
METHOD OF CREATING ANTIVIRUS RECORD WHEN DETECTING MALICIOUS CODE IN RANDOM-ACCESS MEMORY 2015
  • Pavlyushshik Mikhail Aleksandrovich
  • Monastyrskij Aleksej Vladimirovich
  • Nazarov Denis Aleksandrovich
RU2592383C1
SYSTEM AND METHOD OF DETECTING MALICIOUS CODE IN FILE 2016
  • Golovkin Maksim Yurevich
  • Monastyrskij Aleksej Vladimirovich
  • Pintijskij Vladislav Valerevich
  • Pavlyushchik Mikhail Aleksandrovich
  • Butuzov Vitalij Vladimirovich
  • Karasovskij Dmitrij Valerievich
RU2637997C1
METHOD OF DETECTING MALICIOUS CODE IN RANDOM-ACCESS MEMORY 2015
  • Pavlyushshik Mikhail Aleksandrovich
  • Monastyrskij Aleksej Vladimirovich
  • Nazarov Denis Aleksandrovich
RU2589862C1
SYSTEM AND METHOD OF CREATING ANTIVIRUS RECORD 2018
  • Gordejchik Sergej Vladimirovich
  • Soldatov Sergej Vladimirovich
  • Sapronov Konstantin Vladimirovich
RU2697954C2
METHOD OF INVOKING SYSTEM FUNCTIONS IN CONDITIONS OF USE OF AGENTS FOR PROTECTING OPERATING SYSTEM KERNEL 2014
  • Yudin Maksim Vitalevich
  • Tarasenko Aleksandr Sergeevich
  • Levchenko Vyacheslav Ivanovich
  • Kumagin Igor Yurevich
RU2585978C2

RU 2 514 141 C1

Authors

Belov Sergej Jur'Evich

Dates

2014-04-27Published

2012-09-28Filed