FIELD: information technology.
SUBSTANCE: invention relates to software safety, namely to methods of performing boot driver addressing procedures. Method of accessing boot driver procedures, in which: a) in process of operating system loading by driver-interceptor list of not initialised loading drivers is read, which are loaded into memory, but not initialised; b) by means of driver-interceptor call initialisation procedure for trapping of at least one loading driver from a list of been loading drivers is set; c) at installation of handler interception initialisation procedure loading drivers, with help of said handler is replaced by previously read address of entry point of loading address of driver entry point of said handler; d) with help of call initialisation procedure intercepted handler is mounted at least one loading driver from list of not initialised loading drivers; e) with help of handler stored information at least one loading driver, filled with at least one said loading driver during initiation, wherein said information on said loading gate driver contains at least an entry point at least one procedure loading driver; f) by means of at least one of driver-interceptor, anti-driver is accessing procedures of at least one loading driver at previously stored addresses entry points.
EFFECT: providing access to initial procedures of loading drivers in case of procedures interception by root kits by performing addressing procedures of at least one loading driver at previously stored locations.
4 cl, 3 dwg
Title | Year | Author | Number |
---|---|---|---|
METHOD OF CREATING A SYSTEM CALL HANDLER | 2014 |
|
RU2596577C2 |
METHOD OF INVOKING SYSTEM FUNCTIONS IN CONDITIONS OF USE OF AGENTS FOR PROTECTING OPERATING SYSTEM KERNEL | 2014 |
|
RU2585978C2 |
SYSTEM AND METHOD OF OPTIMIZING ANTI-VIRUS TESTING OF INACTIVE OPERATING SYSTEMS | 2016 |
|
RU2638735C2 |
REMOVING TRACK OF HARMFUL ACTIVITY FROM OPERATING SYSTEM, WHICH IS NOT DOWNLOADED ON COMPUTER DEVICE AT PRESENT | 2016 |
|
RU2639666C2 |
METHOD OF DETECTING UNKNOWN PROGRAMS BY LOAD PROCESS EMULATION | 2011 |
|
RU2472215C1 |
SYSTEM AND METHOD OF DETECTING MALICIOUS CODE IN FILE | 2016 |
|
RU2637997C1 |
SYSTEM AND METHOD OF DETERMINING POTENTIALLY MALICIOUS SOFTWARE BASED ON MONITORING FILE INTEGRITY USING TIME MARKS | 2010 |
|
RU2420793C1 |
SECURITY AGENT, OPERATING AT EMBEDDED SOFTWARE LEVEL WITH SUPPORT OF OPERATING SYSTEM SECURITY LEVEL | 2013 |
|
RU2583714C2 |
SYSTEM AND METHOD FOR AUTOMATIC PROCESSING OF SOFTWARE SYSTEM ERRORS | 2012 |
|
RU2521265C2 |
METHOD OF DETECTING MALWARE IN OPERATING SYSTEM KERNEL | 2012 |
|
RU2510075C2 |
Authors
Dates
2016-06-10—Published
2014-12-05—Filed