METHOD OF MALICIOUS FILES DETECTING, EXECUTED BY MEANS OF THE STACK-BASED VIRTUAL MACHINE Russian patent published in 2017 - IPC G06F21/56 

Abstract RU 2624552 C2

FIELD: information technology.

SUBSTANCE: method of malicious files detecting, executed by means of the stack-based virtual machine in which all the executed functions operands are placed in only one data structure, which is the stack of the virtual machine, in which: a) data is extracted from at least one file, executed using the stack-based virtual machine. As the data extracted from the file, executed by means of the stack-based virtual machine, are at least: the file section parameters, acting as at least: the section code, the section name, the section header type, the offset to the section data, the section data size; the parameters of the function, performed by the stack-based virtual machine, which are at least: the function body index, the position and length of the function code in the section, the index of the function descriptor, the maximum depth of the stack in the function execution, the number of the local variables used by function, the name of the function, the number of operands, the return data type; b) provide the search in the safe files cluster base according to the data selected in the step a), of at least one cluster, which contains: the value of one of the file section parameters, exceeding the specified threshold; the value of one of the function parameters, performed by the stack-based virtual machine, exceeding the specified threshold; c) at each found in the step b) cluster the data is extracted. Acting as the data, at least: the file section parameters, such as: the section code, the section name, the section header type, the offset to the section data, the section data size; the parameters of the function, performed by the stack-based virtual machine, such as: the body index of the function, the position and length of the function code in the section, the function descriptor index, the maximum depth of the stack during the function execution, the number of local variables used by function, the name of the function, the number of operands, the return data type; c) create, using the clustering rules at least one cluster from the data, selected in step a), except the data, that corresponds to the data, extracted in the step c); d) calculate the checksum of at least one created cluster; e) provide the search of the calculated checksum in the clusters check sums base of malicious files; f) make the verdict on the detection of at least one malicious file in case of detection as a result of the search, performed at the step e), in the calculated checksums malicious files clusters checksums base.

EFFECT: detection of the malicious files, executed by the stack-based virtual machine, operating at the computer system by creating and using the clusters of the analyzed files data, using the data from the clusters, found in the safe files clusters base to ensure the computer system security.

3 cl, 3 dwg

Similar patents RU2624552C2

Title Year Author Number
SYSTEM AND METHOD OF DETECTING MALICIOUS FILES ACCOMPANIED WITH USING THE STATIC ANALYSIS ELEMENTS 2017
  • Krylov Vladimir Vladimirovich
  • Liskin Aleksandr Viktorovich
RU2654146C1
METHOD AND SYSTEM FOR CLUSTERING EXECUTABLE FILES 2021
  • Pomerantsev Ilya Sergeevich
RU2778979C1
SYSTEM AND METHOD OF CLASSIFICATION OF OBJECTS 2017
  • Chistyakov Aleksandr Sergeevich
  • Lobacheva Ekaterina Maksimovna
  • Romanenko Aleksej Mikhajlovich
RU2679785C1
METHOD AND SYSTEM FOR DETECTING MALICIOUS FILES IN A NON-ISOLATED MEDIUM 2020
  • Prudkovskij Nikolaj Sergeevich
RU2722692C1
SYSTEM AND METHOD FOR TRAINING HARMFUL CONTAINER DETECTION MODEL 2018
  • Krylov Vladimir Vladimirovich
  • Liskin Aleksandr Viktorovich
  • Antonov Aleksej Evgenevich
RU2697955C2
SYSTEM AND METHOD OF MACHINE TRAINING MODEL OF DETECTING MALICIOUS FILES 2017
  • Chistyakov Aleksandr Sergeevich
  • Lobacheva Ekaterina Maksimovna
  • Romanenko Aleksej Mikhajlovich
RU2673708C1
SYSTEM AND METHOD OF DETECTION OF MALICIOUS FILES USING A TRAINED MALWARE DETECTION PATTERN 2017
  • Chistyakov Aleksandr Sergeevich
  • Lobacheva Ekaterina Maksimovna
  • Romanenko Aleksej Mikhajlovich
RU2654151C1
SYSTEM AND METHOD OF MANAGING COMPUTING RESOURCES FOR DETECTING MALICIOUS FILES 2017
  • Chistyakov Aleksandr Sergeevich
  • Lobacheva Ekaterina Maksimovna
  • Romanenko Aleksej Mikhajlovich
RU2659737C1
SYSTEM AND METHOD OF DETECTING A MALICIOUS FILE 2018
  • Chistyakov Aleksandr Sergeevich
  • Romanenko Aleksej Mikhajlovich
  • Shevelev Aleksandr Sergeevich
RU2739865C2
SYSTEM AND METHOD OF SELECTING MEANS OF DETECTING MALICIOUS FILES 2019
  • Chistyakov Aleksandr Sergeevich
  • Romanenko Aleksej Mikhajlovich
RU2739830C1

RU 2 624 552 C2

Authors

Ivanov Anton Mikhajlovich

Liskin Aleksandr Viktorovich

Dates

2017-07-04Published

2015-06-30Filed