METHOD FOR CODE PERFORMANCE IN HYPERVISOR MODE Russian patent published in 2017 - IPC G06F9/455 G06F9/445 G06F12/14 G06F21/44 

Abstract RU 2609761 C1

FIELD: physics, computer engineering.

SUBSTANCE: invention refers to the field of computer security. The method is proposed, including hypervisor code loading to the random-access memory prior to operating system booting; a trusted module to call the hypervisor code execution is loaded to RAM during operating system booting; the first request to the hypervisor from the trusted module in order to obtain the hypervisor address in RAM is sent; a cryptographic key is generated using the hypervisor; the specified key is saved in the hypervisor memory; a memory page is allocated; the specified key and hypervisor address in RAM are recorded in the selected memory page; protection for the allocated memory page is set; a request to the hypervisor at the address recorded in the page selected in step g) is sent from the trusted module in order to call hypervisor code execution, at that, the request contains the key, recorded in the allocated page; the key is checked by means of the hypervisor by comparing the key transmitted in the request sent to the hypervisor from the trusted module to the key stored in the hypervisor memory; if the result is positive, the code is executed in the hypervisor mode.

EFFECT: code execution is provided in the hypervisor mode.

5 dwg

Similar patents RU2609761C1

Title Year Author Number
METHOD OF CREATING ANTIVIRUS RECORD WHEN DETECTING MALICIOUS CODE IN RANDOM-ACCESS MEMORY 2015
  • Pavlyushshik Mikhail Aleksandrovich
  • Monastyrskij Aleksej Vladimirovich
  • Nazarov Denis Aleksandrovich
RU2592383C1
METHOD OF DETECTING MALICIOUS CODE IN RANDOM-ACCESS MEMORY 2015
  • Pavlyushshik Mikhail Aleksandrovich
  • Monastyrskij Aleksej Vladimirovich
  • Nazarov Denis Aleksandrovich
RU2589862C1
SYSTEM AND METHOD OF GENERATING LOG WHEN EXECUTING FILE WITH VULNERABILITIES IN VIRTUAL MACHINE 2018
  • Monastyrskij Aleksej Vladimirovich
  • Pavlyushchik Mikhail Aleksandrovich
  • Pintijskij Vladislav Valerevich
  • Anikin Denis Vyacheslavovich
  • Kirsanov Dmitrij Aleksandrovich
RU2724790C1
SYSTEM AND METHOD FOR LOG FORMING IN VIRTUAL MACHINE FOR ANTI-VIRUS FILE CHECKING 2017
  • Pintijskij Vladislav Valerevich
  • Anikin Denis Vyacheslavovich
  • Kobychev Denis Yurevich
  • Golovkin Maksim Yurevich
  • Butuzov Vitalij Vladimirovich
  • Karasovskij Dmitrij Valerievich
  • Kirsanov Dmitrij Aleksandrovich
RU2649794C1
METHOD OF INVOKING SYSTEM FUNCTIONS IN CONDITIONS OF USE OF AGENTS FOR PROTECTING OPERATING SYSTEM KERNEL 2014
  • Yudin Maksim Vitalevich
  • Tarasenko Aleksandr Sergeevich
  • Levchenko Vyacheslav Ivanovich
  • Kumagin Igor Yurevich
RU2585978C2
ATTESTATION OF HOST CONTAINING TRUSTED EXECUTION ENVIRONMENT 2015
  • Fergyuson Nils T.
  • Samsonov Evgenij Anatolevich
  • Kinskhumann
  • Chandrashekar Samartkha
  • Messek Dzhon Entoni
  • Novak Mark Fishel
  • Makkarron Kristofer
  • Temkhejn Amitabkh Prakash
  • Van Tsyan
  • Krus Devid Mettyu
  • Ben-Zvi Nir
  • Vinberg Anders Bertil
RU2679721C2
METHOD OF CREATING A SYSTEM CALL HANDLER 2014
  • Yudin Maksim Vitalevich
  • Tarasenko Aleksandr Sergeevich
  • Levchenko Vyacheslav Ivanovich
  • Kumagin Igor Yurevich
RU2596577C2
SECURITY AGENTS AND PRIVILEGED MODES 2007
  • Trot Ehrik
  • Folts Forrest
  • Tornton Ehndrju
  • Sinkha Sujash
RU2468418C2
SYSTEM AND METHOD OF DETECTING MALICIOUS SCRIPT 2017
  • Pavlyushchik Mikhail Aleksandrovich
RU2659738C1
SYSTEM AND METHOD OF DETECTING THE HARMFUL CODE IN THE ADDRESS PROCESS SPACE 2017
  • Pavlyushchik Mikhail Aleksandrovich
RU2665910C1

RU 2 609 761 C1

Authors

Igotti Nikolaj Nikolaevich

Ershov Mikhail Aleksandrovich

Dates

2017-02-02Published

2015-09-30Filed