System and method used for detecting malicious code of random access memory

A technique of malicious code, code, applied in the system field of malicious code

Active Publication Date: 2016-07-13
KASPERSKY LAB ZAO
View PDF7 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Although the above approaches address certain problems in the field of detection of malicious code in the address space of trusted processes, they are not effective enough to solve the problem: the mentioned approaches require access to seve

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method used for detecting malicious code of random access memory
  • System and method used for detecting malicious code of random access memory
  • System and method used for detecting malicious code of random access memory

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] Exemplary aspects of the invention are described herein in the context of systems, methods, and computer program products for detecting malicious code in random access memory. Those of ordinary skill in the art will recognize that the following description is exemplary only and is not intended to be limiting in any way. Others will readily suggest themselves to those skilled in the art having the benefit of this disclosure. Reference will now be made in detail to exemplary aspect embodiments as illustrated in the accompanying drawings. The same reference designators will be used throughout the drawings and the following description, to the extent possible, to refer to the same or like items.

[0021] Malicious code (or a program or application) may be computer instructions that cause damage to a computer or a computer user, such as a worm, keylogger, or computer virus. Damage caused may be unauthorized access to computer resources, including data stored on the compute...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a system and a method used for detecting malicious code of a random access memory. The embodiment is characterized in that a hardware processor is used to detect the process of the untrusted application; the hardware processor is used to identify the function call including the inter-process function call from the generating of the process to the target process generated by the process of the untrusted application; the hardware processor is used to determine whether the execute the malicious software analysis executing the code in the address space of the target process called by the inter-process function generated by the process of the untrusted application; when the malicious software analysis is decided to be executed, the anti-virus software executed by the hardware processor can be used to analyze the code in the address space of the target process called by the inter-process function generated by the process of the untrusted application.

Description

technical field [0001] The present invention relates generally to the field of computer security, and more particularly to systems and methods for detecting malicious code in random access memory. Background technique [0002] The number of software applications is growing at enormous pace. Among various applications, there are many malicious programs (malware) that cause harm to computers or computer users, such as worms, keyloggers and computer viruses. There are also many techniques for providing security to computers, such as antivirus software, which are designed to detect malicious programs, as well as limit their operability (eg, place them in quarantine or completely remove them from the computer). [0003] However, there are various methods used by developers of malicious programs to hide the malware's activity from antivirus applications. Depending on the method used by the antivirus application for detecting malware, e.g., signature analysis (searching for a cor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/78G06F21/56
CPCG06F21/554G06F21/566G06F21/78
Inventor M·A·帕夫柳什切克A·V·莫纳斯泰尔斯基D·A·那扎洛夫
Owner KASPERSKY LAB ZAO
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products