CODE EXECUTION PROFILING Russian patent published in 2017 - IPC G06F21/56 

Abstract RU 2627107 C2

FIELD: information technology.

SUBSTANCE: electronic device security system contains a set of malicious software access rules logical circuitry, containing: identification of a plurality of electronic device objects to be monitored; identification of one or more operations between objects to be monitored; and structure identification of the operations to be monitored; and a processor configured to generate, on the basis of a set of malicious software access rules logical circuitry, a notification of executing one of the operations to be monitored; an anti-malware module configured to determine, on the basis of the notification and the monitored operations structure, whether the operations to be monitored indicate the malicious software.

EFFECT: providing a new system and a new way of detecting malicious programs that can not be detected by known systems and methods for the electronic device protection.

24 cl, 4 dwg

Similar patents RU2627107C2

Title Year Author Number
DETECTION AND MITIGATION OF HARM FROM THE MALICIOUS CALL OF SENSITIVE CODE 2015
  • Sahita Ravi
  • Deng Lu
  • Shanbhogue Vedvyas
  • Lu Lixin
  • Shepsen Alexander
  • Tatourian Igor
RU2665897C2
SYSTEMS AND METHODS OF MONITORING MALWARE BEHAVIOR TO MULTIPLE OBJECTS OF SOFTWARE 2016
  • Khazhmasan George-Florin
  • Portase Radu-Maryan
RU2683152C1
COMPUTER SECURITY SYSTEMS AND METHODS USING ASYNCHRONOUS INTROSPECTION EXCEPTIONS 2016
  • Lukaks Sandor
  • Sirb Kristyan-Bogdan
  • Lutas Andrej-Vlad
RU2703156C2
CONTROL OF THE PRESENCE OF THE AGENT FOR SELF-RESTORING 2014
  • Thakur, Shashin
  • Boggarapu, Arvind K.
  • Singh, Harvir
RU2667598C1
PROTECTION OF OPERATING SYSTEM RESOURCES 2007
  • Bejker Brendon
  • Fild Skott A.
  • Trot Ehrik
  • Sinkha Sujash
  • Ganguli Dzhoj
  • Folts Forrest
  • Katler Dehvid
RU2462747C2
DETECTION OF HARMFUL SOFTWARE WITH CROSS-REVIEW 2015
  • Hunt, Simon
  • Mankin, Jennifer
  • Zimmerman, Jeffrey
RU2667052C2
SECURITY AGENTS AND PRIVILEGED MODES 2007
  • Trot Ehrik
  • Folts Forrest
  • Tornton Ehndrju
  • Sinkha Sujash
RU2468418C2
DYNAMIC REPUTATION INDICATOR FOR OPTIMIZATION OF COMPUTER SECURITY OPERATIONS 2017
  • Hajmasan Gheorghe-Florin
  • Mondoc Alexandra
  • Portase Radu-Marian
RU2723665C1
WEB PAGE DOMAIN MONITORING METHOD 2008
  • Ehpling Dzheremia S.
RU2501086C2
PRIORITY ACCESS TO PRIORITY ACCESS CHANNEL 2015
  • Khassan Amer A.
  • Mitchell Pol Uillyam Aleksandr
  • Khogen Todd
  • Garnett Pol V.
RU2688244C2

RU 2 627 107 C2

Authors

Muttik Igor

Dates

2017-08-03Published

2014-03-03Filed