FIELD: information technology.
SUBSTANCE: invention relates to the protection of computing devices, namely to control access to composite files. Method for controlling access to a compound file, in which it is determined whether the file is composite or not, first set of characteristics from the header of the composite file is allocated, if the previous step confirms that the file is composite, a second set of attributes is extracted from the directory of the composite file if the previous stage determines that the file is composite, calculating a hash of the composite file using the first and second feature set, providing access to the composite file from the user side of the computing device, if the computed hash of the compound file matches the hash of the trusted composite file.
EFFECT: protection of the computing device under the user accessing composite files.
5 cl, 4 dwg
Title | Year | Author | Number |
---|---|---|---|
METHOD OF DETECTING HARMFUL COMPOSITE FILES | 2016 |
|
RU2634178C1 |
METHOD FOR DETERMINING SIMILARITY OF COMPOSITE FILES | 2016 |
|
RU2628922C1 |
SYSTEM AND METHOD FOR TWO-STAGE CLASSIFICATION OF FILES | 2018 |
|
RU2708356C1 |
SYSTEM AND METHOD OF FORMATION OF ANTI-VIRUS RECORDS USED TO DETECT MALICIOUS FILES ON USER'S COMPUTER | 2015 |
|
RU2617654C2 |
METHOD OF CREATING ANTIVIRUS RECORD WHEN DETECTING MALICIOUS CODE IN RANDOM-ACCESS MEMORY | 2015 |
|
RU2592383C1 |
METHOD FOR FASTER FULL ANTIVIRUS SCANNING OF FILES ON MOBILE DEVICE | 2019 |
|
RU2726878C1 |
METHOD FOR SELECTIVE REPEATED ANTIVIRUS SCANNING OF FILES ON MOBILE DEVICE | 2019 |
|
RU2726877C1 |
METHOD OF DETECTING MALICIOUS CODE IN RANDOM-ACCESS MEMORY | 2015 |
|
RU2589862C1 |
SYSTEM AND METHOD OF REDUCING NUMBER OF FALSE TRIGGERING OF CLASSIFICATION ALGORITHMS | 2018 |
|
RU2706883C1 |
METHOD FOR DETECTING MALICIOUS FILES BASED ON FILE FRAGMENTS | 2019 |
|
RU2747464C2 |
Authors
Dates
2018-07-03—Published
2017-09-29—Filed