METHOD OF CODE EXECUTION BY INTERPRETER Russian patent published in 2017 - IPC G06F9/455 

Abstract RU 2634171 C1

FIELD: information technology.

SUBSTANCE: computer-implemented method of program code executing by an interpreter is disclosed, in which: a) each instruction of the code under investigation is executed sequentially; b) when the interpreter proceeds to execute the instruction of the code under investigation, containing an unknown object for which the interpreter has no rule of interpretation, the further execution of the code under investigation is suspend. The object is one of: a procedure; an instance of a class; a method or an instance variable of a class; scenario; file; c) receive an auxiliary code, the result of which corresponds to the result of the execution of mentioned unknown object. The auxiliary code contains familiar objects for which the interpretation rule is present in the interpreter; d) each auxiliary code instruction is performed consistently; and e) after finishing execution of the auxiliary code, execution of the code under investigation in step b) is resumed from the next instruction of the code under investigation until the last instruction of the code under investigation is executed.

EFFECT: improving the quality of execution of the program code by the interpreter.

8 cl, 4 dwg, 6 tbl

Similar patents RU2634171C1

Title Year Author Number
METHOD OF DETECTING MALICIOUS EXECUTABLES, CONTAINING INTERPRETER, BY COMBINING EMULATORS 2015
  • Zakorzhevskij Vyacheslav Vladimirovich
  • Vinogradov Dmitrij Valerevich
  • Pintijskij Vladislav Valerevich
  • Kirsanov Dmitrij Aleksandrovich
RU2622627C2
EMULATOR AND METHOD FOR EMULATION 2020
  • Pintijskij Vladislav Valerevich
  • Anikin Denis Vyacheslavovich
  • Kirsanov Dmitrij Aleksandrovich
  • Trofimenko Sergej Vladimirovich
RU2757409C1
SYSTEM AND METHOD OF DETECTING MALICIOUS CODE IN FILE 2016
  • Golovkin Maksim Yurevich
  • Monastyrskij Aleksej Vladimirovich
  • Pintijskij Vladislav Valerevich
  • Pavlyushchik Mikhail Aleksandrovich
  • Butuzov Vitalij Vladimirovich
  • Karasovskij Dmitrij Valerievich
RU2637997C1
SYSTEM AND METHOD OF CREATING ANTIVIRUS RECORD 2018
  • Gordejchik Sergej Vladimirovich
  • Soldatov Sergej Vladimirovich
  • Sapronov Konstantin Vladimirovich
RU2697954C2
METHOD OF DETECTING UNKNOWN PROGRAMS BY LOAD PROCESS EMULATION 2011
  • Parshin Jurij Gennad'Evich
  • Pintijskij Vladislav Valer'Evich
RU2472215C1
METHOD OF INCREASING RELIABILITY OF DETECTING MALICIOUS SOFTWARE 2012
  • Golovanov Sergej Jur'Evich
RU2485577C1
METHOD OF EMULATING SYSTEM FUNCTION CALLS FOR EVADING EMULATION COUNTERMEASURES 2012
  • Belov Sergej Jur'Evich
RU2514141C1
SYSTEM AND METHOD OF CREATING SOFTWARE DETECTION RECORDS 2012
  • Golovkin Maksim Jur'Evich
RU2491615C1
SYSTEM AND METHOD FOR IDENTIFYING MALICIOUS FILES 2017
  • Gordejchik Sergej Vladimirovich
  • Soldatov Sergej Vladimirovich
  • Sapronov Konstantin Vladimirovich
RU2673407C1
SYSTEM AND METHOD OF PROTECTING COMPUTING DEVICE FROM MALICIOUS OBJECTS USING COMPLEX INFECTION SCHEMES 2011
  • Poljakov Aleksej Aleksandrovich
  • Martynenko Vladislav Valer'Evich
  • Slobodjanjuk Jurij Gennad'Evich
  • Nazarov Denis Aleksandrovich
  • Pavljushchik Mikhail Aleksandrovich
RU2454705C1

RU 2 634 171 C1

Authors

Davydov Vasilij Aleksandrovich

Vinogradov Dmitrij Valerevich

Gavrilchenko Roman Yurevich

Kirsanov Dmitrij Aleksandrovich

Dates

2017-10-24Published

2016-12-12Filed