METHODS, SYSTEMS AND COMPUTER-READABLE MEDIUM FOR TARGET DEVICES ACTIVE CONTROL, MEMORY PROTECTION AND INTEGRITY CHECKING Russian patent published in 2017 - IPC G06F21/50 

Abstract RU 2615664 C2

FIELD: machine building.

SUBSTANCE: disclosed are methods, systems and computer-readable media for target device integrity checking. Said result is achieved due to application of system, which implements method, providing for performance of stages, at which: instantiating normal environment virtual processor and safe environment virtual processor on target device; executing target operating system on normal environment virtual processor; executing integrity check agent on safe environment virtual processor; intercepting one or more specified operations by safe environment virtual processor, which try to perform on normal environment virtual processor; and using integrity check agent to determine effect of target device intercepted operation performance.

EFFECT: technical result consists in target devices memory protection and integrity checking.

15 cl, 2 dwg

Similar patents RU2615664C2

Title Year Author Number
ATTESTATION OF HOST CONTAINING TRUSTED EXECUTION ENVIRONMENT 2015
  • Fergyuson Nils T.
  • Samsonov Evgenij Anatolevich
  • Kinskhumann
  • Chandrashekar Samartkha
  • Messek Dzhon Entoni
  • Novak Mark Fishel
  • Makkarron Kristofer
  • Temkhejn Amitabkh Prakash
  • Van Tsyan
  • Krus Devid Mettyu
  • Ben-Zvi Nir
  • Vinberg Anders Bertil
RU2679721C2
VIRTUAL MACHINE MANAGER FACILITATED SELECTIVE CODE INTEGRITY ENFORCEMENT 2014
  • Khepkin Devid A.
  • Dzhonson Kennet D.
RU2667713C2
SYSTEM AND METHODS FOR AUDITING A VIRTUAL MACHINE 2017
  • Lukacs Sandor
  • Lutas Andrei-Vlad
  • Anichitei Ionel C.
RU2691187C1
SYSTEM AND METHOD FOR PROTECTION FROM NON-TRUSTED SYSTEM CONTROL MODE CODE BY MEANS OF REDIRECTION OF SYSTEM MANAGEMENT MODE INTERRUPT AND CREATION OF VIRTUAL MACHINE CONTAINER 2003
  • Satton Ii Dzhejms
  • Graurok Dehvid
  • Ulig Richard
  • Pojsner Dehvid
  • Glu Ehndrju
  • Kholl Klifford
  • Smit Iii Lorens
  • Nejger Gilbert
  • Kozukh Majkl
  • Dzhordzh Robert
  • Berdzhess Brehdli
RU2313126C2
SYSTEM AND METHOD OF DETECTING MALICIOUS CODE IN FILE 2016
  • Golovkin Maksim Yurevich
  • Monastyrskij Aleksej Vladimirovich
  • Pintijskij Vladislav Valerevich
  • Pavlyushchik Mikhail Aleksandrovich
  • Butuzov Vitalij Vladimirovich
  • Karasovskij Dmitrij Valerievich
RU2637997C1
PROTECTION OF OPERATING SYSTEM RESOURCES 2007
  • Bejker Brendon
  • Fild Skott A.
  • Trot Ehrik
  • Sinkha Sujash
  • Ganguli Dzhoj
  • Folts Forrest
  • Katler Dehvid
RU2462747C2
MEMORY INTROSPECTION ENGINE FOR PROTECTING INTEGRITY OF VIRTUAL MACHINES 2014
  • Lutsas Andrej-Vlad
  • Lukaks Sandor
  • Lutsas Dan-Khorya
RU2640300C2
SYSTEM AND METHOD OF PROTECTING COMPUTER APPLICATIONS 2011
  • Rusakov Vjacheslav Evgen'Evich
  • Shirjaev Aleksandr Vasil'Evich
RU2460133C1
EVENT FILTERING FOR SECURITY APPLICATIONS OF VIRTUAL MACHINES 2017
  • Lutas Andrei-Vlad
RU2723668C1
SYSTEMS AND METHODS FOR PREVENTION OF UNAUTHORIZED STACK PIVOTING 2014
  • Patel Bajdzhu V.
  • Li Syaonin
  • Envin Kh.P.
  • Mellik Asit K.
  • Nejdzher Gilbert
  • Krosslend Dzhejms B.
  • Opfermen Toubi
  • Kkhare Atul A.
  • Brendt Dzhejson V.
  • Kouk Dzhejms S.
  • Vajda Brajan L.
RU2629442C2

RU 2 615 664 C2

Authors

Azab Akhmed

Nin Pen

Dates

2017-04-06Published

2013-03-15Filed