FIELD: information technologies.
SUBSTANCE: according to one implementation version one proposes a method for acceleration of emulation of the process launched from the executive file; the method involves the following stages: file execution emulation is performed according to the instructions; the emulator hardware accelerator launch condition met, the file execution emulation process is transferred into the hardware accelerator; the file execution is performed according to the instructions with the help of the hardware accelerator until an exclusion call or API-function call; the file execution emulation process is transferred back into the emulator; the file execution efficiency is assessed according to the instructions with the help of the hardware accelerator; the hardware accelerator launch conditions are modified depending on the obtained efficiency value; the presented stages are repeated no less than 2 times.
EFFECT: enhancement of operational efficiency of hardware acceleration of applications emulation.
3 cl, 5 dwg
Title | Year | Author | Number |
---|---|---|---|
EMULATOR AND METHOD FOR EMULATION | 2020 |
|
RU2757409C1 |
METHOD OF DETECTING MALICIOUS EXECUTABLES, CONTAINING INTERPRETER, BY COMBINING EMULATORS | 2015 |
|
RU2622627C2 |
METHOD OF EMULATING SYSTEM FUNCTION CALLS FOR EVADING EMULATION COUNTERMEASURES | 2012 |
|
RU2514141C1 |
SYSTEM AND METHOD OF STORAGE OF EMULATOR STATE AND ITS FURTHER RECOVERY | 2013 |
|
RU2553056C2 |
METHOD OF DETECTING UNKNOWN PROGRAMS BY LOAD PROCESS EMULATION | 2011 |
|
RU2472215C1 |
SYSTEM AND METHOD OF DETECTING MALICIOUS CODE IN FILE | 2016 |
|
RU2637997C1 |
SYSTEM AND METHOD FOR AUTOMATIC PROCESSING OF SOFTWARE SYSTEM ERRORS | 2012 |
|
RU2521265C2 |
SYSTEM AND METHOD OF CREATING SOFTWARE DETECTION RECORDS | 2012 |
|
RU2491615C1 |
SYSTEM AND METHOD OF GENERATING LOG WHEN EXECUTING FILE WITH VULNERABILITIES IN VIRTUAL MACHINE | 2018 |
|
RU2724790C1 |
METHOD FOR FILE EXECUTION EMULATION | 2017 |
|
RU2659734C1 |
Authors
Dates
2014-04-27—Published
2012-12-25—Filed