VIRTUAL MACHINE MANAGER FACILITATED SELECTIVE CODE INTEGRITY ENFORCEMENT Russian patent published in 2018 - IPC G06F9/455 

Abstract RU 2667713 C2

FIELD: computer equipment.

SUBSTANCE: invention relates to the computer equipment. Method implemented in a computing device for protecting against malicious programs comprises executable code to be executed by a virtual processor of a virtual machine, the virtual machine being managed by a virtual machine manager, determining whether the memory page is to be executable in a kernel mode or in an user mode, providing an opportunity in response to determining that the memory page is not to be executable in kernel mode, the operating system of the virtual machine to determine whether to allow execution of the executable code in user mode.

EFFECT: technical result consists in protecting against malicious programs.

10 cl, 5 dwg

Similar patents RU2667713C2

Title Year Author Number
METHODS, SYSTEMS AND COMPUTER-READABLE MEDIUM FOR TARGET DEVICES ACTIVE CONTROL, MEMORY PROTECTION AND INTEGRITY CHECKING 2013
  • Azab Akhmed
  • Nin Pen
RU2615664C2
PROTECTION OF OPERATING SYSTEM RESOURCES 2007
  • Bejker Brendon
  • Fild Skott A.
  • Trot Ehrik
  • Sinkha Sujash
  • Ganguli Dzhoj
  • Folts Forrest
  • Katler Dehvid
RU2462747C2
ATTESTATION OF HOST CONTAINING TRUSTED EXECUTION ENVIRONMENT 2015
  • Fergyuson Nils T.
  • Samsonov Evgenij Anatolevich
  • Kinskhumann
  • Chandrashekar Samartkha
  • Messek Dzhon Entoni
  • Novak Mark Fishel
  • Makkarron Kristofer
  • Temkhejn Amitabkh Prakash
  • Van Tsyan
  • Krus Devid Mettyu
  • Ben-Zvi Nir
  • Vinberg Anders Bertil
RU2679721C2
METHOD OF FUNCTIONING COMPUTER DEVICE OPERATING SYSTEM OF SOFTWARE AND HARDWARE COMPLEX 2016
  • Molyakov Andrej Sergeevich
RU2626350C1
SECURITY AGENTS AND PRIVILEGED MODES 2007
  • Trot Ehrik
  • Folts Forrest
  • Tornton Ehndrju
  • Sinkha Sujash
RU2468418C2
SYSTEM AND METHOD OF VIRTUALISING GRAPHIC SUBSYSTEMS 2005
  • Blit Dehvid R.
RU2406128C2
TECHNIQUES FOR DOWNLOADING TARGET OBJECT OF VIRTUAL STORAGE 2010
  • Oshins Dzhejkob
  • Grin Dastin L.
RU2562436C2
RESTRICTING MEMORY AREAS FOR INSTRUCTION READING DEPENDING ON HARDWARE MODE AND SECURITY FLAG 2010
  • Grajzentuehjt Richard Roj
RU2513909C1
CONFIGURATION OF ISOLATED EXTENSIONS AND DEVICE DRIVERS 2006
  • Khant Galen K.
  • Larus Dzhejms R.
  • Fandrich Manuehl A.
  • Khodson Orion
  • Levi Stiven P.
  • Stensgor B'Jarne
  • Tarditi Dehvid R.
  • Spear Majkl
  • Karbin Majkl
  • Abadi Martin
  • Ajken Mark
  • Barkhehm Pol
  • Uobber Tehd
  • Zill Brajan
  • Khoblittsel Kris
  • Merfi Nik
RU2443012C2
SYSTEMS AND METHODS FOR PREVENTION OF UNAUTHORIZED STACK PIVOTING 2014
  • Patel Bajdzhu V.
  • Li Syaonin
  • Envin Kh.P.
  • Mellik Asit K.
  • Nejdzher Gilbert
  • Krosslend Dzhejms B.
  • Opfermen Toubi
  • Kkhare Atul A.
  • Brendt Dzhejson V.
  • Kouk Dzhejms S.
  • Vajda Brajan L.
RU2629442C2

RU 2 667 713 C2

Authors

Khepkin Devid A.

Dzhonson Kennet D.

Dates

2018-09-24Published

2014-09-12Filed