FIELD: physics.
SUBSTANCE: method of restricting the access of the machine code image to the resources provided by the operating system, in which: a) the machine code image is obtained; b) the parent assembly is defined, where the parent assembly is an assembly, on the basis of which the resulting image was created; c) a correspondence is established between the obtained machine code image and the certain parent assembly, where the correspondence guarantees the invariance of the machine code image after creation; d) the trust category defined at the stage prior to the parent assembly is determined; e) the trust category of the obtained machine code image based on the trust category of the parent assembly is determined, where the obtained machine code image, for which the correspondence is established in step g), is assigned a trust category of the parent assembly; g) the access is restricted to the obtained machine code image having the untrusted trust category to the resources provided by the operating system.
EFFECT: improving the security of the device by restricting access to the machine code image that has an untrusted trust category to the resources provided by the operating system.
2 cl, 9 dwg, 2 tbl
Title | Year | Author | Number |
---|---|---|---|
METHOD FOR DETECTING HARMFUL ASSEMBLIES | 2015 |
|
RU2628920C2 |
MACHINE CODE ACCESS LIMITATION METHOD TO THE OPERATING SYSTEM RESOURCES | 2016 |
|
RU2625052C1 |
METHOD FOR ANTI-VIRUS SCANNING OF COMPUTER SYSTEM | 2015 |
|
RU2617925C2 |
SYSTEM AND METHOD FOR CATEGORIZATION OF .NET APPLICATIONS | 2018 |
|
RU2756186C2 |
SYSTEM AND METHOD OF DETECTING THE HARMFUL CIL-FILE | 2017 |
|
RU2660643C1 |
METHOD AND SYSTEM FOR INTERCEPTING .NET CALLS BY MEANS OF PATCHES IN INTERMEDIATE LANGUAGE | 2022 |
|
RU2815242C1 |
CACHING RUNTIME GENERATED CODE | 2009 |
|
RU2520344C2 |
CONFIGURATION OF ISOLATED EXTENSIONS AND DEVICE DRIVERS | 2006 |
|
RU2443012C2 |
METHOD TO PREVENT REVERSE ENGINEERING OF SOFTWARE, UNAUTHORISED MODIFICATION AND DATA CAPTURE DURING PERFORMANCE | 2006 |
|
RU2439669C2 |
SYSTEM AND METHOD FOR DETECTING MALICIOUS CODE IN THE EXECUTED FILE | 2020 |
|
RU2757807C1 |
Authors
Dates
2017-11-09—Published
2015-03-31—Filed