FIELD: information technology.
SUBSTANCE: machine code access limitation method to resources, provided by the operating system in which: a) the write access to at least one machine code image is limited; b) define the parent assembly, where the parent assembly is the assembly on the basis of which the image was created, the write access to which is limited; c) replace the image, the access to which is limited, by the image created on the basis of the certain parent assembly; d) determine the particular parent assembly trust category; e) assign the trust category, defined for the parent assembly to the machine code updated image; f) limit the access to the machine code image, that has the trust category untrusted to resources, provided by the operating system.
EFFECT: improvement of the device security by limiting the machine code image access, having the trust category untrusted to the resources, provided by the operating system.
4 cl, 9 dwg
Title | Year | Author | Number |
---|---|---|---|
METHOD FOR DETECTING HARMFUL ASSEMBLIES | 2015 |
|
RU2628920C2 |
METHOD OF CATEGORIZING ASSEMBLIES AND DEPENDENT IMAGES | 2015 |
|
RU2635271C2 |
METHOD FOR ANTI-VIRUS SCANNING OF COMPUTER SYSTEM | 2015 |
|
RU2617925C2 |
SYSTEM AND METHOD FOR CATEGORIZATION OF .NET APPLICATIONS | 2018 |
|
RU2756186C2 |
SYSTEM AND METHOD OF DETECTING THE HARMFUL CIL-FILE | 2017 |
|
RU2660643C1 |
METHOD AND SYSTEM FOR INTERCEPTING .NET CALLS BY MEANS OF PATCHES IN INTERMEDIATE LANGUAGE | 2022 |
|
RU2815242C1 |
CONFIGURATION OF ISOLATED EXTENSIONS AND DEVICE DRIVERS | 2006 |
|
RU2443012C2 |
METHOD TO PREVENT REVERSE ENGINEERING OF SOFTWARE, UNAUTHORISED MODIFICATION AND DATA CAPTURE DURING PERFORMANCE | 2006 |
|
RU2439669C2 |
CACHING RUNTIME GENERATED CODE | 2009 |
|
RU2520344C2 |
SYSTEM AND METHOD FOR DETECTING MALICIOUS CODE IN THE EXECUTED FILE | 2020 |
|
RU2757807C1 |
Authors
Dates
2017-07-11—Published
2016-03-18—Filed