FIELD: information technology.
SUBSTANCE: electronic device security system contains a set of malicious software access rules logical circuitry, containing: identification of a plurality of electronic device objects to be monitored; identification of one or more operations between objects to be monitored; and structure identification of the operations to be monitored; and a processor configured to generate, on the basis of a set of malicious software access rules logical circuitry, a notification of executing one of the operations to be monitored; an anti-malware module configured to determine, on the basis of the notification and the monitored operations structure, whether the operations to be monitored indicate the malicious software.
EFFECT: providing a new system and a new way of detecting malicious programs that can not be detected by known systems and methods for the electronic device protection.
24 cl, 4 dwg
Title | Year | Author | Number |
---|---|---|---|
DETECTION AND MITIGATION OF HARM FROM THE MALICIOUS CALL OF SENSITIVE CODE | 2015 |
|
RU2665897C2 |
SYSTEMS AND METHODS OF MONITORING MALWARE BEHAVIOR TO MULTIPLE OBJECTS OF SOFTWARE | 2016 |
|
RU2683152C1 |
COMPUTER SECURITY SYSTEMS AND METHODS USING ASYNCHRONOUS INTROSPECTION EXCEPTIONS | 2016 |
|
RU2703156C2 |
CONTROL OF THE PRESENCE OF THE AGENT FOR SELF-RESTORING | 2014 |
|
RU2667598C1 |
PROTECTION OF OPERATING SYSTEM RESOURCES | 2007 |
|
RU2462747C2 |
DETECTION OF HARMFUL SOFTWARE WITH CROSS-REVIEW | 2015 |
|
RU2667052C2 |
SECURITY AGENTS AND PRIVILEGED MODES | 2007 |
|
RU2468418C2 |
DYNAMIC REPUTATION INDICATOR FOR OPTIMIZATION OF COMPUTER SECURITY OPERATIONS | 2017 |
|
RU2723665C1 |
WEB PAGE DOMAIN MONITORING METHOD | 2008 |
|
RU2501086C2 |
PRIORITY ACCESS TO PRIORITY ACCESS CHANNEL | 2015 |
|
RU2688244C2 |
Authors
Dates
2017-08-03—Published
2014-03-03—Filed