SYSTEM AND METHOD OF FORMING A LOG WHEN EXECUTING A FILE WITH VULNERABILITIES IN A VIRTUAL MACHINE

Disclosed herein are systems and methods for forming a log during an execution of a file with vulnerabilities. In one example, an exemplary method comprises, discovering an activation of a trigger during an execution of a thread of a process created upon opening the file, wherein the trigger describ...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: KIRSANOV, Dmitry A, PINTIYSKY, Vladislav V, MONASTYRSKY, Alexey V, ANIKIN, Denis V, PAVLYUSHCHIK, Mikhail A
Format: Patent
Sprache:eng ; fre ; ger
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator KIRSANOV, Dmitry A
PINTIYSKY, Vladislav V
MONASTYRSKY, Alexey V
ANIKIN, Denis V
PAVLYUSHCHIK, Mikhail A
description Disclosed herein are systems and methods for forming a log during an execution of a file with vulnerabilities. In one example, an exemplary method comprises, discovering an activation of a trigger during an execution of a thread of a process created upon opening the file, wherein the trigger describes conditions accompanying an event which relates to an attempt to exploit a vulnerability of the file, analyzing a stack of the process created upon opening the file, and discovering a chain of function calls preceding the event in a form of a sequence of call and return addresses, analyzing the discovered chain of function calls for fulfillment of conditions of the trigger which relate to the attempt to exploit the vulnerability, and when the conditions of the trigger are fulfilled, saving information about the chain of function calls in a log.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_EP3674940B1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>EP3674940B1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_EP3674940B13</originalsourceid><addsrcrecordid>eNqNiksKwjAUALtxIeod3gUEpUVxmbYvzYN8JHlpdVWqxJVood4fBT2Aq4GZmWeXcA6MBoStwSArV4OTIJ03ZBsQoF0DnUILeMIq8ldK0ggdsYI2aotelKSJCQOQ_eSWPEehwYhKkcVlNrsN9ymtflxkIJErtU7js0_TOFzTI716POa7fXEoNuU2_2N5AzlVMxk</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>SYSTEM AND METHOD OF FORMING A LOG WHEN EXECUTING A FILE WITH VULNERABILITIES IN A VIRTUAL MACHINE</title><source>esp@cenet</source><creator>KIRSANOV, Dmitry A ; PINTIYSKY, Vladislav V ; MONASTYRSKY, Alexey V ; ANIKIN, Denis V ; PAVLYUSHCHIK, Mikhail A</creator><creatorcontrib>KIRSANOV, Dmitry A ; PINTIYSKY, Vladislav V ; MONASTYRSKY, Alexey V ; ANIKIN, Denis V ; PAVLYUSHCHIK, Mikhail A</creatorcontrib><description>Disclosed herein are systems and methods for forming a log during an execution of a file with vulnerabilities. In one example, an exemplary method comprises, discovering an activation of a trigger during an execution of a thread of a process created upon opening the file, wherein the trigger describes conditions accompanying an event which relates to an attempt to exploit a vulnerability of the file, analyzing a stack of the process created upon opening the file, and discovering a chain of function calls preceding the event in a form of a sequence of call and return addresses, analyzing the discovered chain of function calls for fulfillment of conditions of the trigger which relate to the attempt to exploit the vulnerability, and when the conditions of the trigger are fulfilled, saving information about the chain of function calls in a log.</description><language>eng ; fre ; ger</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC DIGITAL DATA PROCESSING ; PHYSICS</subject><creationdate>2024</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20240529&amp;DB=EPODOC&amp;CC=EP&amp;NR=3674940B1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20240529&amp;DB=EPODOC&amp;CC=EP&amp;NR=3674940B1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>KIRSANOV, Dmitry A</creatorcontrib><creatorcontrib>PINTIYSKY, Vladislav V</creatorcontrib><creatorcontrib>MONASTYRSKY, Alexey V</creatorcontrib><creatorcontrib>ANIKIN, Denis V</creatorcontrib><creatorcontrib>PAVLYUSHCHIK, Mikhail A</creatorcontrib><title>SYSTEM AND METHOD OF FORMING A LOG WHEN EXECUTING A FILE WITH VULNERABILITIES IN A VIRTUAL MACHINE</title><description>Disclosed herein are systems and methods for forming a log during an execution of a file with vulnerabilities. In one example, an exemplary method comprises, discovering an activation of a trigger during an execution of a thread of a process created upon opening the file, wherein the trigger describes conditions accompanying an event which relates to an attempt to exploit a vulnerability of the file, analyzing a stack of the process created upon opening the file, and discovering a chain of function calls preceding the event in a form of a sequence of call and return addresses, analyzing the discovered chain of function calls for fulfillment of conditions of the trigger which relate to the attempt to exploit the vulnerability, and when the conditions of the trigger are fulfilled, saving information about the chain of function calls in a log.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>PHYSICS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2024</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNqNiksKwjAUALtxIeod3gUEpUVxmbYvzYN8JHlpdVWqxJVood4fBT2Aq4GZmWeXcA6MBoStwSArV4OTIJ03ZBsQoF0DnUILeMIq8ldK0ggdsYI2aotelKSJCQOQ_eSWPEehwYhKkcVlNrsN9ymtflxkIJErtU7js0_TOFzTI716POa7fXEoNuU2_2N5AzlVMxk</recordid><startdate>20240529</startdate><enddate>20240529</enddate><creator>KIRSANOV, Dmitry A</creator><creator>PINTIYSKY, Vladislav V</creator><creator>MONASTYRSKY, Alexey V</creator><creator>ANIKIN, Denis V</creator><creator>PAVLYUSHCHIK, Mikhail A</creator><scope>EVB</scope></search><sort><creationdate>20240529</creationdate><title>SYSTEM AND METHOD OF FORMING A LOG WHEN EXECUTING A FILE WITH VULNERABILITIES IN A VIRTUAL MACHINE</title><author>KIRSANOV, Dmitry A ; PINTIYSKY, Vladislav V ; MONASTYRSKY, Alexey V ; ANIKIN, Denis V ; PAVLYUSHCHIK, Mikhail A</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_EP3674940B13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng ; fre ; ger</language><creationdate>2024</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>PHYSICS</topic><toplevel>online_resources</toplevel><creatorcontrib>KIRSANOV, Dmitry A</creatorcontrib><creatorcontrib>PINTIYSKY, Vladislav V</creatorcontrib><creatorcontrib>MONASTYRSKY, Alexey V</creatorcontrib><creatorcontrib>ANIKIN, Denis V</creatorcontrib><creatorcontrib>PAVLYUSHCHIK, Mikhail A</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>KIRSANOV, Dmitry A</au><au>PINTIYSKY, Vladislav V</au><au>MONASTYRSKY, Alexey V</au><au>ANIKIN, Denis V</au><au>PAVLYUSHCHIK, Mikhail A</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>SYSTEM AND METHOD OF FORMING A LOG WHEN EXECUTING A FILE WITH VULNERABILITIES IN A VIRTUAL MACHINE</title><date>2024-05-29</date><risdate>2024</risdate><abstract>Disclosed herein are systems and methods for forming a log during an execution of a file with vulnerabilities. In one example, an exemplary method comprises, discovering an activation of a trigger during an execution of a thread of a process created upon opening the file, wherein the trigger describes conditions accompanying an event which relates to an attempt to exploit a vulnerability of the file, analyzing a stack of the process created upon opening the file, and discovering a chain of function calls preceding the event in a form of a sequence of call and return addresses, analyzing the discovered chain of function calls for fulfillment of conditions of the trigger which relate to the attempt to exploit the vulnerability, and when the conditions of the trigger are fulfilled, saving information about the chain of function calls in a log.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng ; fre ; ger
recordid cdi_epo_espacenet_EP3674940B1
source esp@cenet
subjects CALCULATING
COMPUTING
COUNTING
ELECTRIC DIGITAL DATA PROCESSING
PHYSICS
title SYSTEM AND METHOD OF FORMING A LOG WHEN EXECUTING A FILE WITH VULNERABILITIES IN A VIRTUAL MACHINE
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-19T15%3A54%3A43IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=KIRSANOV,%20Dmitry%20A&rft.date=2024-05-29&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EEP3674940B1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true