FIELD: computer safety.
SUBSTANCE: invention relates to computer security. Disclosed is a method comprising, in response to a tentative determination that a target object is suspected of being malicious, generating at a client computer system a plurality of target hashes of target object, each target hash representing a distinct code block of target object, comprising a sequence of processor instructions; sending a plurality of target hashes to a server; receiving from server computer system a server-side indicator of whether target object is malicious, wherein server-side indicator is generated by retrieving a plurality of reference hashes of a reference object for at least a target hash of plurality of target hashes, wherein reference object is selected from a set of whitelisted objects according to target hash, when plurality of target hashes is not identical to plurality of reference hashes, determining a similarity score according to a count of hashes common to both plurality of target hashes and plurality of reference hashes; and when similarity score exceeds a predetermined threshold, designating target object as non-malicious.
EFFECT: technical result consists in improvement of efficiency of whitelisting, without reduction of data security.
30 cl, 11 dwg
Title | Year | Author | Number |
---|---|---|---|
SYSTEM AND METHOD FOR CHECKING WEB RESOURCES FOR PRESENCE OF HARMFUL INSERTS | 2017 |
|
RU2662391C1 |
DYNAMIC REPUTATION INDICATOR FOR OPTIMIZATION OF COMPUTER SECURITY OPERATIONS | 2017 |
|
RU2723665C1 |
SYSTEMS AND METHODS FOR USING A REPUTATION INDICATOR TO FACILITATE MALWARE SCANNING | 2014 |
|
RU2646352C2 |
CASCADE CLASSIFIER FOR THE COMPUTER SECURITY APPLICATIONS | 2016 |
|
RU2680738C1 |
SYSTEMS AND METHODS FOR USING DNS MESSAGES FOR SELECTIVE COLLECTION OF COMPUTER FORENSIC DATA | 2020 |
|
RU2776349C1 |
DOUBLE SELF-TEST OF MEMORY FOR PROTECTION OF MULTIPLE NETWORK ENDPOINTS | 2016 |
|
RU2714607C2 |
SYSTEM AND METHODS FOR AUDITING A VIRTUAL MACHINE | 2017 |
|
RU2691187C1 |
METHOD AND APPARATUS FOR DETECTING VIRUSES IN FILE SYSTEM | 2010 |
|
RU2551820C2 |
ASSESSMENT OF FILE REPUTATION | 2015 |
|
RU2690759C2 |
SYSTEMS AND METHODS OF MONITORING MALWARE BEHAVIOR TO MULTIPLE OBJECTS OF SOFTWARE | 2016 |
|
RU2683152C1 |
Authors
Dates
2017-01-10—Published
2012-09-05—Filed