FIELD: information technology.
SUBSTANCE: computer-implemented method of program code executing by an interpreter is disclosed, in which: a) each instruction of the code under investigation is executed sequentially; b) when the interpreter proceeds to execute the instruction of the code under investigation, containing an unknown object for which the interpreter has no rule of interpretation, the further execution of the code under investigation is suspend. The object is one of: a procedure; an instance of a class; a method or an instance variable of a class; scenario; file; c) receive an auxiliary code, the result of which corresponds to the result of the execution of mentioned unknown object. The auxiliary code contains familiar objects for which the interpretation rule is present in the interpreter; d) each auxiliary code instruction is performed consistently; and e) after finishing execution of the auxiliary code, execution of the code under investigation in step b) is resumed from the next instruction of the code under investigation until the last instruction of the code under investigation is executed.
EFFECT: improving the quality of execution of the program code by the interpreter.
8 cl, 4 dwg, 6 tbl
Title | Year | Author | Number |
---|---|---|---|
METHOD OF DETECTING MALICIOUS EXECUTABLES, CONTAINING INTERPRETER, BY COMBINING EMULATORS | 2015 |
|
RU2622627C2 |
EMULATOR AND METHOD FOR EMULATION | 2020 |
|
RU2757409C1 |
SYSTEM AND METHOD OF DETECTING MALICIOUS CODE IN FILE | 2016 |
|
RU2637997C1 |
SYSTEM AND METHOD OF CREATING ANTIVIRUS RECORD | 2018 |
|
RU2697954C2 |
METHOD OF DETECTING UNKNOWN PROGRAMS BY LOAD PROCESS EMULATION | 2011 |
|
RU2472215C1 |
METHOD OF INCREASING RELIABILITY OF DETECTING MALICIOUS SOFTWARE | 2012 |
|
RU2485577C1 |
METHOD OF EMULATING SYSTEM FUNCTION CALLS FOR EVADING EMULATION COUNTERMEASURES | 2012 |
|
RU2514141C1 |
SYSTEM AND METHOD OF CREATING SOFTWARE DETECTION RECORDS | 2012 |
|
RU2491615C1 |
SYSTEM AND METHOD FOR IDENTIFYING MALICIOUS FILES | 2017 |
|
RU2673407C1 |
SYSTEM AND METHOD OF PROTECTING COMPUTING DEVICE FROM MALICIOUS OBJECTS USING COMPLEX INFECTION SCHEMES | 2011 |
|
RU2454705C1 |
Authors
Dates
2017-10-24—Published
2016-12-12—Filed