SYSTEM AND METHOD OF FORMING A LOG WHEN EXECUTING A FILE WITH VULNERABILITIES IN A VIRTUAL MACHINE
Disclosed herein are systems and methods for forming a log during an execution of a file with vulnerabilities. In one example, an exemplary method comprises, discovering an activation of a trigger during an execution of a thread of a process created upon opening the file, wherein the trigger describ...
Gespeichert in:
Hauptverfasser: | , , , , |
---|---|
Format: | Patent |
Sprache: | eng ; fre ; ger |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | KIRSANOV, Dmitry A PINTIYSKY, Vladislav V MONASTYRSKY, Alexey V ANIKIN, Denis V PAVLYUSHCHIK, Mikhail A |
description | Disclosed herein are systems and methods for forming a log during an execution of a file with vulnerabilities. In one example, an exemplary method comprises, discovering an activation of a trigger during an execution of a thread of a process created upon opening the file, wherein the trigger describes conditions accompanying an event which relates to an attempt to exploit a vulnerability of the file, analyzing a stack of the process created upon opening the file, and discovering a chain of function calls preceding the event in a form of a sequence of call and return addresses, analyzing the discovered chain of function calls for fulfillment of conditions of the trigger which relate to the attempt to exploit the vulnerability, and when the conditions of the trigger are fulfilled, saving information about the chain of function calls in a log. |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_EP3674940B1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>EP3674940B1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_EP3674940B13</originalsourceid><addsrcrecordid>eNqNiksKwjAUALtxIeod3gUEpUVxmbYvzYN8JHlpdVWqxJVood4fBT2Aq4GZmWeXcA6MBoStwSArV4OTIJ03ZBsQoF0DnUILeMIq8ldK0ggdsYI2aotelKSJCQOQ_eSWPEehwYhKkcVlNrsN9ymtflxkIJErtU7js0_TOFzTI716POa7fXEoNuU2_2N5AzlVMxk</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>SYSTEM AND METHOD OF FORMING A LOG WHEN EXECUTING A FILE WITH VULNERABILITIES IN A VIRTUAL MACHINE</title><source>esp@cenet</source><creator>KIRSANOV, Dmitry A ; PINTIYSKY, Vladislav V ; MONASTYRSKY, Alexey V ; ANIKIN, Denis V ; PAVLYUSHCHIK, Mikhail A</creator><creatorcontrib>KIRSANOV, Dmitry A ; PINTIYSKY, Vladislav V ; MONASTYRSKY, Alexey V ; ANIKIN, Denis V ; PAVLYUSHCHIK, Mikhail A</creatorcontrib><description>Disclosed herein are systems and methods for forming a log during an execution of a file with vulnerabilities. In one example, an exemplary method comprises, discovering an activation of a trigger during an execution of a thread of a process created upon opening the file, wherein the trigger describes conditions accompanying an event which relates to an attempt to exploit a vulnerability of the file, analyzing a stack of the process created upon opening the file, and discovering a chain of function calls preceding the event in a form of a sequence of call and return addresses, analyzing the discovered chain of function calls for fulfillment of conditions of the trigger which relate to the attempt to exploit the vulnerability, and when the conditions of the trigger are fulfilled, saving information about the chain of function calls in a log.</description><language>eng ; fre ; ger</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC DIGITAL DATA PROCESSING ; PHYSICS</subject><creationdate>2024</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20240529&DB=EPODOC&CC=EP&NR=3674940B1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20240529&DB=EPODOC&CC=EP&NR=3674940B1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>KIRSANOV, Dmitry A</creatorcontrib><creatorcontrib>PINTIYSKY, Vladislav V</creatorcontrib><creatorcontrib>MONASTYRSKY, Alexey V</creatorcontrib><creatorcontrib>ANIKIN, Denis V</creatorcontrib><creatorcontrib>PAVLYUSHCHIK, Mikhail A</creatorcontrib><title>SYSTEM AND METHOD OF FORMING A LOG WHEN EXECUTING A FILE WITH VULNERABILITIES IN A VIRTUAL MACHINE</title><description>Disclosed herein are systems and methods for forming a log during an execution of a file with vulnerabilities. In one example, an exemplary method comprises, discovering an activation of a trigger during an execution of a thread of a process created upon opening the file, wherein the trigger describes conditions accompanying an event which relates to an attempt to exploit a vulnerability of the file, analyzing a stack of the process created upon opening the file, and discovering a chain of function calls preceding the event in a form of a sequence of call and return addresses, analyzing the discovered chain of function calls for fulfillment of conditions of the trigger which relate to the attempt to exploit the vulnerability, and when the conditions of the trigger are fulfilled, saving information about the chain of function calls in a log.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>PHYSICS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2024</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNqNiksKwjAUALtxIeod3gUEpUVxmbYvzYN8JHlpdVWqxJVood4fBT2Aq4GZmWeXcA6MBoStwSArV4OTIJ03ZBsQoF0DnUILeMIq8ldK0ggdsYI2aotelKSJCQOQ_eSWPEehwYhKkcVlNrsN9ymtflxkIJErtU7js0_TOFzTI716POa7fXEoNuU2_2N5AzlVMxk</recordid><startdate>20240529</startdate><enddate>20240529</enddate><creator>KIRSANOV, Dmitry A</creator><creator>PINTIYSKY, Vladislav V</creator><creator>MONASTYRSKY, Alexey V</creator><creator>ANIKIN, Denis V</creator><creator>PAVLYUSHCHIK, Mikhail A</creator><scope>EVB</scope></search><sort><creationdate>20240529</creationdate><title>SYSTEM AND METHOD OF FORMING A LOG WHEN EXECUTING A FILE WITH VULNERABILITIES IN A VIRTUAL MACHINE</title><author>KIRSANOV, Dmitry A ; PINTIYSKY, Vladislav V ; MONASTYRSKY, Alexey V ; ANIKIN, Denis V ; PAVLYUSHCHIK, Mikhail A</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_EP3674940B13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng ; fre ; ger</language><creationdate>2024</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>PHYSICS</topic><toplevel>online_resources</toplevel><creatorcontrib>KIRSANOV, Dmitry A</creatorcontrib><creatorcontrib>PINTIYSKY, Vladislav V</creatorcontrib><creatorcontrib>MONASTYRSKY, Alexey V</creatorcontrib><creatorcontrib>ANIKIN, Denis V</creatorcontrib><creatorcontrib>PAVLYUSHCHIK, Mikhail A</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>KIRSANOV, Dmitry A</au><au>PINTIYSKY, Vladislav V</au><au>MONASTYRSKY, Alexey V</au><au>ANIKIN, Denis V</au><au>PAVLYUSHCHIK, Mikhail A</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>SYSTEM AND METHOD OF FORMING A LOG WHEN EXECUTING A FILE WITH VULNERABILITIES IN A VIRTUAL MACHINE</title><date>2024-05-29</date><risdate>2024</risdate><abstract>Disclosed herein are systems and methods for forming a log during an execution of a file with vulnerabilities. In one example, an exemplary method comprises, discovering an activation of a trigger during an execution of a thread of a process created upon opening the file, wherein the trigger describes conditions accompanying an event which relates to an attempt to exploit a vulnerability of the file, analyzing a stack of the process created upon opening the file, and discovering a chain of function calls preceding the event in a form of a sequence of call and return addresses, analyzing the discovered chain of function calls for fulfillment of conditions of the trigger which relate to the attempt to exploit the vulnerability, and when the conditions of the trigger are fulfilled, saving information about the chain of function calls in a log.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng ; fre ; ger |
recordid | cdi_epo_espacenet_EP3674940B1 |
source | esp@cenet |
subjects | CALCULATING COMPUTING COUNTING ELECTRIC DIGITAL DATA PROCESSING PHYSICS |
title | SYSTEM AND METHOD OF FORMING A LOG WHEN EXECUTING A FILE WITH VULNERABILITIES IN A VIRTUAL MACHINE |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-19T15%3A54%3A43IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=KIRSANOV,%20Dmitry%20A&rft.date=2024-05-29&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EEP3674940B1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |