FIELD: computer safety.
SUBSTANCE: invention relates to computer security. Computing device for determining a suspicious executable object is disclosed, comprising a storage device and one or more hardware and/or software logic elements, comprising a cross-view detection mechanism configured to monitor the first operation, executed by the executable in the memory at the first level of abstraction; monitoring, in fact, simultaneous second operation performed by the executable object in the memory at the second level of abstraction, second level of abstraction differs from the first level of abstraction; determination that the first operation, in essence, causes a different computational result than the second operation, definition comprises converting the first operation and the second operation into a comparable format; and designating the executable object as suspicious.
EFFECT: technical result is a more reliable definition of a suspicious executable object that can be malicious software.
23 cl, 5 dwg
Title | Year | Author | Number |
---|---|---|---|
SYSTEM AND METHOD OF INCREASING EFFICIENCY OF DETECTING UNKNOWN HARMFUL OBJECTS | 2010 |
|
RU2454714C1 |
METHOD FOR DELAYED ELIMINATION OF MALICIOUS CODE | 2014 |
|
RU2583711C2 |
SYSTEM AND METHOD OF PROTECTING COMPUTER APPLICATIONS | 2011 |
|
RU2460133C1 |
SECURITY AGENT, OPERATING AT EMBEDDED SOFTWARE LEVEL WITH SUPPORT OF OPERATING SYSTEM SECURITY LEVEL | 2013 |
|
RU2583714C2 |
SYSTEM AND METHOD OF DETECTING MALICIOUS CODE IN FILE | 2016 |
|
RU2637997C1 |
EMULATOR AND METHOD FOR EMULATION | 2020 |
|
RU2757409C1 |
SYSTEM AND METHOD FOR FILTERING FILES TO CONTROL APPLICATIONS | 2014 |
|
RU2584505C2 |
METHOD FOR AUTOMATIC ADJUSTMENT OF SECURITY MEANS | 2012 |
|
RU2514137C1 |
SYSTEM AND METHOD FOR DETECTING MALWARE BY CREATING ISOLATED ENVIRONMENT | 2012 |
|
RU2535175C2 |
TECHNOLOGIES OF DESTRUCTION IN DELETION TO OPTIMISE SOLID-STATE DRIVE | 2008 |
|
RU2456664C2 |
Authors
Dates
2018-09-13—Published
2015-08-25—Filed