SYSTEM AND METHOD OF DETECTING THE HARMFUL CODE IN THE ADDRESS PROCESS SPACE Russian patent published in 2018 - IPC G06F21/56 

Abstract RU 2665910 C1

FIELD: information technologies.

SUBSTANCE: invention relates to information security. Method for detecting malicious code in the address space of a process, performed by a computer system where: a) detect using the interception tool to start the process from a trusted executable file, while in the process address space there is an image of the executable file; b) detect, with the help of the interceptor, the call performed at the execution of the process to a suspicious memory address, while the memory address is suspicious, if this memory address belongs to a suspicious memory area in the address space of the process; a suspicious memory area in the address space of a process running from an executable file is a memory area, that is outside the image of the executable file in the address space mentioned and at the same time is the executable memory area; c) use with the help of the security tool to analyze the memory area in the address space of the process in the vicinity of the suspect memory address, while during the analysis, the image of the executable file downloaded from another file is found in the process address space; d) detect by means of the security tool the malicious code in the address space of the process by analyzing the detected image of the executable file downloaded from another file, and the analysis is performed using malicious code signatures.

EFFECT: technical result is the detection of malicious code in the address space of the process.

6 cl, 3 dwg

Similar patents RU2665910C1

Title Year Author Number
SYSTEM AND METHOD OF DETECTING MALICIOUS SCRIPT 2017
  • Pavlyushchik Mikhail Aleksandrovich
RU2659738C1
METHOD OF DETECTING SUSPICIOUS ACTIVITY ASSOCIATED WITH USING COMMAND LINE INTERPRETER 2023
  • Ovcharik Vladislav Ivanovich
  • Shulmin Aleksei Sergeevich
RU2817556C1
SYSTEM AND METHOD OF ASSESSMENT OF HARMFULLNESS OF CODE EXECUTED IN ADDRESSING SPACE OF CONFIDENTIAL PROCESS 2013
  • Pavljushchik Mikhail Aleksandrovich
RU2531861C1
EMULATOR AND METHOD FOR EMULATION 2020
  • Pintijskij Vladislav Valerevich
  • Anikin Denis Vyacheslavovich
  • Kirsanov Dmitrij Aleksandrovich
  • Trofimenko Sergej Vladimirovich
RU2757409C1
METHOD OF CREATING ANTIVIRUS RECORD WHEN DETECTING MALICIOUS CODE IN RANDOM-ACCESS MEMORY 2015
  • Pavlyushshik Mikhail Aleksandrovich
  • Monastyrskij Aleksej Vladimirovich
  • Nazarov Denis Aleksandrovich
RU2592383C1
METHOD OF DETECTING MALICIOUS CODE IN RANDOM-ACCESS MEMORY 2015
  • Pavlyushshik Mikhail Aleksandrovich
  • Monastyrskij Aleksej Vladimirovich
  • Nazarov Denis Aleksandrovich
RU2589862C1
METHOD OF DETECTING MALICIOUS EXECUTABLES, CONTAINING INTERPRETER, BY COMBINING EMULATORS 2015
  • Zakorzhevskij Vyacheslav Vladimirovich
  • Vinogradov Dmitrij Valerevich
  • Pintijskij Vladislav Valerevich
  • Kirsanov Dmitrij Aleksandrovich
RU2622627C2
SYSTEM AND METHOD OF REDUCING LOAD ON OPERATING SYSTEM WHEN EXECUTING ANTIVIRUS APPLICATION 2013
  • Sobko Andrej Vladimirovich
  • Judin Maksim Vital'Evich
  • Mezhuev Pavel Nikolaevich
  • Godunov Il'Ja Borisovich
  • Shirokij Maksim Aleksandrovich
RU2571723C2
METHOD FOR EXCLUDING PROCESSES OF ANTIVIRUS SCANNING ON THE BASIS OF DATA ON FILE 2015
  • Levchenko Vyacheslav Ivanovich
  • Yudin Maksim Vitalevich
RU2595510C1
SYSTEM AND METHOD FOR CATEGORIZATION OF .NET APPLICATIONS 2018
  • Kuskov Vladimir Anatolevich
  • Anikin Denis Vyacheslavovich
  • Kirsanov Dmitrij Aleksandrovich
RU2756186C2

RU 2 665 910 C1

Authors

Pavlyushchik Mikhail Aleksandrovich

Dates

2018-09-04Published

2017-09-29Filed