FIELD: computer equipment.
SUBSTANCE: invention relates to the computer equipment. Method implemented in a computing device for protecting against malicious programs comprises executable code to be executed by a virtual processor of a virtual machine, the virtual machine being managed by a virtual machine manager, determining whether the memory page is to be executable in a kernel mode or in an user mode, providing an opportunity in response to determining that the memory page is not to be executable in kernel mode, the operating system of the virtual machine to determine whether to allow execution of the executable code in user mode.
EFFECT: technical result consists in protecting against malicious programs.
10 cl, 5 dwg
Title | Year | Author | Number |
---|---|---|---|
METHODS, SYSTEMS AND COMPUTER-READABLE MEDIUM FOR TARGET DEVICES ACTIVE CONTROL, MEMORY PROTECTION AND INTEGRITY CHECKING | 2013 |
|
RU2615664C2 |
PROTECTION OF OPERATING SYSTEM RESOURCES | 2007 |
|
RU2462747C2 |
ATTESTATION OF HOST CONTAINING TRUSTED EXECUTION ENVIRONMENT | 2015 |
|
RU2679721C2 |
METHOD OF FUNCTIONING COMPUTER DEVICE OPERATING SYSTEM OF SOFTWARE AND HARDWARE COMPLEX | 2016 |
|
RU2626350C1 |
SECURITY AGENTS AND PRIVILEGED MODES | 2007 |
|
RU2468418C2 |
SYSTEM AND METHOD OF VIRTUALISING GRAPHIC SUBSYSTEMS | 2005 |
|
RU2406128C2 |
TECHNIQUES FOR DOWNLOADING TARGET OBJECT OF VIRTUAL STORAGE | 2010 |
|
RU2562436C2 |
RESTRICTING MEMORY AREAS FOR INSTRUCTION READING DEPENDING ON HARDWARE MODE AND SECURITY FLAG | 2010 |
|
RU2513909C1 |
CONFIGURATION OF ISOLATED EXTENSIONS AND DEVICE DRIVERS | 2006 |
|
RU2443012C2 |
SYSTEMS AND METHODS FOR PREVENTION OF UNAUTHORIZED STACK PIVOTING | 2014 |
|
RU2629442C2 |
Authors
Dates
2018-09-24—Published
2014-09-12—Filed