FIELD: machine building.
SUBSTANCE: disclosed are methods, systems and computer-readable media for target device integrity checking. Said result is achieved due to application of system, which implements method, providing for performance of stages, at which: instantiating normal environment virtual processor and safe environment virtual processor on target device; executing target operating system on normal environment virtual processor; executing integrity check agent on safe environment virtual processor; intercepting one or more specified operations by safe environment virtual processor, which try to perform on normal environment virtual processor; and using integrity check agent to determine effect of target device intercepted operation performance.
EFFECT: technical result consists in target devices memory protection and integrity checking.
15 cl, 2 dwg
Title | Year | Author | Number |
---|---|---|---|
ATTESTATION OF HOST CONTAINING TRUSTED EXECUTION ENVIRONMENT | 2015 |
|
RU2679721C2 |
VIRTUAL MACHINE MANAGER FACILITATED SELECTIVE CODE INTEGRITY ENFORCEMENT | 2014 |
|
RU2667713C2 |
SYSTEM AND METHODS FOR AUDITING A VIRTUAL MACHINE | 2017 |
|
RU2691187C1 |
SYSTEM AND METHOD FOR PROTECTION FROM NON-TRUSTED SYSTEM CONTROL MODE CODE BY MEANS OF REDIRECTION OF SYSTEM MANAGEMENT MODE INTERRUPT AND CREATION OF VIRTUAL MACHINE CONTAINER | 2003 |
|
RU2313126C2 |
SYSTEM AND METHOD OF DETECTING MALICIOUS CODE IN FILE | 2016 |
|
RU2637997C1 |
PROTECTION OF OPERATING SYSTEM RESOURCES | 2007 |
|
RU2462747C2 |
MEMORY INTROSPECTION ENGINE FOR PROTECTING INTEGRITY OF VIRTUAL MACHINES | 2014 |
|
RU2640300C2 |
SYSTEM AND METHOD OF PROTECTING COMPUTER APPLICATIONS | 2011 |
|
RU2460133C1 |
EVENT FILTERING FOR SECURITY APPLICATIONS OF VIRTUAL MACHINES | 2017 |
|
RU2723668C1 |
SYSTEMS AND METHODS FOR PREVENTION OF UNAUTHORIZED STACK PIVOTING | 2014 |
|
RU2629442C2 |
Authors
Dates
2017-04-06—Published
2013-03-15—Filed