METHOD OF CATEGORIZING ASSEMBLIES AND DEPENDENT IMAGES Russian patent published in 2017 - IPC G06F21/57 

Abstract RU 2635271 C2

FIELD: physics.

SUBSTANCE: method of restricting the access of the machine code image to the resources provided by the operating system, in which: a) the machine code image is obtained; b) the parent assembly is defined, where the parent assembly is an assembly, on the basis of which the resulting image was created; c) a correspondence is established between the obtained machine code image and the certain parent assembly, where the correspondence guarantees the invariance of the machine code image after creation; d) the trust category defined at the stage prior to the parent assembly is determined; e) the trust category of the obtained machine code image based on the trust category of the parent assembly is determined, where the obtained machine code image, for which the correspondence is established in step g), is assigned a trust category of the parent assembly; g) the access is restricted to the obtained machine code image having the untrusted trust category to the resources provided by the operating system.

EFFECT: improving the security of the device by restricting access to the machine code image that has an untrusted trust category to the resources provided by the operating system.

2 cl, 9 dwg, 2 tbl

Similar patents RU2635271C2

Title Year Author Number
METHOD FOR DETECTING HARMFUL ASSEMBLIES 2015
  • Ivanov Dmitrij Gennadevich
  • Pavlov Nikita Alekseevich
  • Shvetsov Dmitrij Vladimirovich
  • Gorshenin Mikhail Aleksandrovich
RU2628920C2
MACHINE CODE ACCESS LIMITATION METHOD TO THE OPERATING SYSTEM RESOURCES 2016
  • Ivanov Dmitrij Gennadevich
  • Pavlov Nikita Alekseevich
  • Shvetsov Dmitrij Vladimirovich
  • Gorshenin Mikhail Aleksandrovich
RU2625052C1
METHOD FOR ANTI-VIRUS SCANNING OF COMPUTER SYSTEM 2015
  • Solodovnikov Andrej Yurevich
  • Ladikov Andrej Vladimirovich
  • Tsvetkov Sergej Valerevich
RU2617925C2
SYSTEM AND METHOD FOR CATEGORIZATION OF .NET APPLICATIONS 2018
  • Kuskov Vladimir Anatolevich
  • Anikin Denis Vyacheslavovich
  • Kirsanov Dmitrij Aleksandrovich
RU2756186C2
SYSTEM AND METHOD OF DETECTING THE HARMFUL CIL-FILE 2017
  • Krylov Vladimir Vladimirovich
  • Liskin Aleksandr Viktorovich
  • Antonov Aleksej Evgenevich
RU2660643C1
METHOD AND SYSTEM FOR INTERCEPTING .NET CALLS BY MEANS OF PATCHES IN INTERMEDIATE LANGUAGE 2022
  • Tretyakov Yurij Alekseevich
  • Sachkov Ilya Konstantinovich
RU2815242C1
CACHING RUNTIME GENERATED CODE 2009
  • Kherring Natan
  • Rajton Dehvid K.
RU2520344C2
CONFIGURATION OF ISOLATED EXTENSIONS AND DEVICE DRIVERS 2006
  • Khant Galen K.
  • Larus Dzhejms R.
  • Fandrich Manuehl A.
  • Khodson Orion
  • Levi Stiven P.
  • Stensgor B'Jarne
  • Tarditi Dehvid R.
  • Spear Majkl
  • Karbin Majkl
  • Abadi Martin
  • Ajken Mark
  • Barkhehm Pol
  • Uobber Tehd
  • Zill Brajan
  • Khoblittsel Kris
  • Merfi Nik
RU2443012C2
METHOD TO PREVENT REVERSE ENGINEERING OF SOFTWARE, UNAUTHORISED MODIFICATION AND DATA CAPTURE DURING PERFORMANCE 2006
  • Asipov Keren
  • Asipov Boris
RU2439669C2
SYSTEM AND METHOD FOR DETECTING MALICIOUS CODE IN THE EXECUTED FILE 2020
  • Yashina Yuliana Konstantinovna
  • Borisov Aleksandr Pavlovich
  • Pakhomov Aleksej Mikhajlovich
RU2757807C1

RU 2 635 271 C2

Authors

Ivanov Dmitrij Gennadevich

Pavlov Nikita Alekseevich

Shvetsov Dmitrij Vladimirovich

Gorshenin Mikhail Aleksandrovich

Dates

2017-11-09Published

2015-03-31Filed