FIELD: information security.
SUBSTANCE: invention is proposed to suppress the threat of privilege spoofing caused by a vulnerability in the OS. It is achieved by isolating the file that used the discovered vulnerability. Vulnerability detection is performed using vulnerability detection rules based on the result of a check for illegal changes in process or thread privileges.
EFFECT: suppressing the threat of privilege spoofing caused by a vulnerability in the OS.
8 cl, 4 dwg, 2 ex
Title | Year | Author | Number |
---|---|---|---|
SYSTEM AND METHOD OF GENERATING LOG WHEN EXECUTING FILE WITH VULNERABILITIES IN VIRTUAL MACHINE | 2018 |
|
RU2724790C1 |
SYSTEM AND METHOD OF CREATING ANTIVIRUS RECORD | 2018 |
|
RU2697954C2 |
SYSTEM AND METHOD FOR ANTI-VIRUS SCANNING SETTING | 2015 |
|
RU2617923C2 |
SECURITY AGENT, OPERATING AT EMBEDDED SOFTWARE LEVEL WITH SUPPORT OF OPERATING SYSTEM SECURITY LEVEL | 2013 |
|
RU2583714C2 |
METHOD FOR DETECTING AN ANOMALY IN THE BEHAVIOR OF A TRUSTED PROCESS AND A SYSTEM FOR ITS IMPLEMENTATION | 2022 |
|
RU2790329C1 |
SYSTEM AND METHOD OF REDUCING LOAD ON OPERATING SYSTEM WHEN EXECUTING ANTIVIRUS APPLICATION | 2013 |
|
RU2571723C2 |
SYSTEM AND METHOD OF DETECTING MALICIOUS CODE IN FILE | 2016 |
|
RU2637997C1 |
SYSTEM AND METHOD OF DETECTING THE SIGNS OF COMPUTER ATTACKS | 2017 |
|
RU2661533C1 |
SYSTEM AND METHOD OF CORRELATING EVENTS FOR DETECTING INFORMATION SECURITY INCIDENT | 2019 |
|
RU2739864C1 |
SYSTEM AND METHOD OF DETECTING LATENT BEHAVIOUR OF BROWSER EXTENSION | 2018 |
|
RU2697950C2 |
Authors
Dates
2023-06-08—Published
2022-06-15—Filed