Detection of hidden objects in a computer system

System and method for detecting a security compromise of a service module of an operating system running on a computer. At least one native service module returns a first set of requested information relating to at least one object in the computer system in response to a request made by at least one...

Full description

Saved in:
Bibliographic Details
Main Author RUSAKOV VYACHESLAV E
Format Patent
LanguageEnglish
Published 18.03.2014
Subjects
Online AccessGet full text

Cover

Loading…
Abstract System and method for detecting a security compromise of a service module of an operating system running on a computer. At least one native service module returns a first set of requested information relating to at least one object in the computer system in response to a request made by at least one process or thread. A secondary service module generates and returns a second set of requested information relating to the at least one object in the computer system in response to a request made by at least one authorized process or thread, bypassing the at least one native service module. Access of threads is limited to the secondary service module such that only predetermined threads generated by a trusted security application are permitted to access the secondary service module.
AbstractList System and method for detecting a security compromise of a service module of an operating system running on a computer. At least one native service module returns a first set of requested information relating to at least one object in the computer system in response to a request made by at least one process or thread. A secondary service module generates and returns a second set of requested information relating to the at least one object in the computer system in response to a request made by at least one authorized process or thread, bypassing the at least one native service module. Access of threads is limited to the secondary service module such that only predetermined threads generated by a trusted security application are permitted to access the secondary service module.
Author RUSAKOV VYACHESLAV E
Author_xml – fullname: RUSAKOV VYACHESLAV E
BookMark eNrjYmDJy89L5WQwcEktSU0uyczPU8hPU8jITElJBbKSsoBixQqZeQqJCsn5uQWlJalFCsWVxSWpuTwMrGmJOcWpvFCam0HBzTXE2UM3tSA_PrW4IDE5NS-1JD402MLM3NzE0sjJyJgIJQDp6Syz
ContentType Patent
DBID EVB
DatabaseName esp@cenet
DatabaseTitleList
Database_xml – sequence: 1
  dbid: EVB
  name: esp@cenet
  url: http://worldwide.espacenet.com/singleLineSearch?locale=en_EP
  sourceTypes: Open Access Repository
DeliveryMethod fulltext_linktorsrc
Discipline Medicine
Chemistry
Sciences
Physics
ExternalDocumentID US8677492B2
GroupedDBID EVB
ID FETCH-epo_espacenet_US8677492B23
IEDL.DBID EVB
IngestDate Fri Jul 19 13:57:46 EDT 2024
IsOpenAccess true
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-epo_espacenet_US8677492B23
Notes Application Number: US20100955279
OpenAccessLink https://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20140318&DB=EPODOC&CC=US&NR=8677492B2
ParticipantIDs epo_espacenet_US8677492B2
PublicationCentury 2000
PublicationDate 20140318
PublicationDateYYYYMMDD 2014-03-18
PublicationDate_xml – month: 03
  year: 2014
  text: 20140318
  day: 18
PublicationDecade 2010
PublicationYear 2014
RelatedCompanies RUSAKOV VYACHESLAV E
KASPERSKY LAB ZAO
RelatedCompanies_xml – name: RUSAKOV VYACHESLAV E
– name: KASPERSKY LAB ZAO
Score 2.9344728
Snippet System and method for detecting a security compromise of a service module of an operating system running on a computer. At least one native service module...
SourceID epo
SourceType Open Access Repository
SubjectTerms CALCULATING
COMPUTING
COUNTING
ELECTRIC DIGITAL DATA PROCESSING
PHYSICS
Title Detection of hidden objects in a computer system
URI https://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20140318&DB=EPODOC&locale=&CC=US&NR=8677492B2
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1LT8MwDLam8bxBATFeygH1VtFHCt2hQupLExLbxFa029SEVOslnWgRfx8ndIML3CJHshxLjh3nyxeAW445GevkoVWIQFi0FMxigSMs7lK_dLnj-UyjLcb3o5w-LfxFD6rNWxjNE_qpyRExojjGe6v36_VPEyvR2MrmjlUoqh-zeZiY3elYkc9hOCdRmE4nySQ24zjMZ-b4JVS0bXToRrhb76gqWtHsp6-RepSy_p1RsiPYnaIy2R5DT0gDDuLNx2sG7D93990G7GmAJm9Q2AVhcwI2mqYBVJLUJVkpDhAcMdVQaUglSUF491UD-eZpPgWSpfN4ZKERy-2Cl_lsa653Bn1ZS3EOpLSLQjyg8dzhlNs-88vC47ZgNOBYhbwNYPCnmot_5i7hUHlOAauc4Ar67fuHuMZM27Ib7aMvU3eDRQ
link.rule.ids 230,309,786,891,25594,76906
linkProvider European Patent Office
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV3dT4MwEL8s82O-6dQ4P_tgeCPCAMceiAkwMnVjiwOzN0K7EnmBRTD--14rm77oW3NNLtdLrndtf_0dwC3DnIx18lBNuc1VM-NUpbbOVdY3razPdMOiEm0R3o9j82lpLVuQb_7CSJ7QT0mOiBHFMN5ruV-vfy6xfImtrO5ojqLyIYgcX2lOx4J8DsPZd53RfObPPMXznHihhC-OoG0zh30Xd-udgSDnFZXTqys-pax_Z5TgEHbnqKyoj6DFiy50vE3jtS7sT5v37i7sSYAmq1DYBGF1DBqaJgFUBSkz8iY4QHBExYVKRfKCpIQ1rRrIN0_zCZBgFHljFY1ItgtO4sXWXOMU2kVZ8DMgmZamfIBHAKYzk2kWtbLUYBqnps2wCln1oPenmvN_5m6gM46mk2TyGD5fwIHwogBZ6fYltOv3D36FWbem19JfX59qhjI
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Apatent&rft.title=Detection+of+hidden+objects+in+a+computer+system&rft.inventor=RUSAKOV+VYACHESLAV+E&rft.date=2014-03-18&rft.externalDBID=B2&rft.externalDocID=US8677492B2