Detection of hidden objects in a computer system
System and method for detecting a security compromise of a service module of an operating system running on a computer. At least one native service module returns a first set of requested information relating to at least one object in the computer system in response to a request made by at least one...
Saved in:
Main Author | |
---|---|
Format | Patent |
Language | English |
Published |
18.03.2014
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | System and method for detecting a security compromise of a service module of an operating system running on a computer. At least one native service module returns a first set of requested information relating to at least one object in the computer system in response to a request made by at least one process or thread. A secondary service module generates and returns a second set of requested information relating to the at least one object in the computer system in response to a request made by at least one authorized process or thread, bypassing the at least one native service module. Access of threads is limited to the secondary service module such that only predetermined threads generated by a trusted security application are permitted to access the secondary service module. |
---|---|
AbstractList | System and method for detecting a security compromise of a service module of an operating system running on a computer. At least one native service module returns a first set of requested information relating to at least one object in the computer system in response to a request made by at least one process or thread. A secondary service module generates and returns a second set of requested information relating to the at least one object in the computer system in response to a request made by at least one authorized process or thread, bypassing the at least one native service module. Access of threads is limited to the secondary service module such that only predetermined threads generated by a trusted security application are permitted to access the secondary service module. |
Author | RUSAKOV VYACHESLAV E |
Author_xml | – fullname: RUSAKOV VYACHESLAV E |
BookMark | eNrjYmDJy89L5WQwcEktSU0uyczPU8hPU8jITElJBbKSsoBixQqZeQqJCsn5uQWlJalFCsWVxSWpuTwMrGmJOcWpvFCam0HBzTXE2UM3tSA_PrW4IDE5NS-1JD402MLM3NzE0sjJyJgIJQDp6Syz |
ContentType | Patent |
DBID | EVB |
DatabaseName | esp@cenet |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: EVB name: esp@cenet url: http://worldwide.espacenet.com/singleLineSearch?locale=en_EP sourceTypes: Open Access Repository |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Medicine Chemistry Sciences Physics |
ExternalDocumentID | US8677492B2 |
GroupedDBID | EVB |
ID | FETCH-epo_espacenet_US8677492B23 |
IEDL.DBID | EVB |
IngestDate | Fri Jul 19 13:57:46 EDT 2024 |
IsOpenAccess | true |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-epo_espacenet_US8677492B23 |
Notes | Application Number: US20100955279 |
OpenAccessLink | https://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20140318&DB=EPODOC&CC=US&NR=8677492B2 |
ParticipantIDs | epo_espacenet_US8677492B2 |
PublicationCentury | 2000 |
PublicationDate | 20140318 |
PublicationDateYYYYMMDD | 2014-03-18 |
PublicationDate_xml | – month: 03 year: 2014 text: 20140318 day: 18 |
PublicationDecade | 2010 |
PublicationYear | 2014 |
RelatedCompanies | RUSAKOV VYACHESLAV E KASPERSKY LAB ZAO |
RelatedCompanies_xml | – name: RUSAKOV VYACHESLAV E – name: KASPERSKY LAB ZAO |
Score | 2.9344728 |
Snippet | System and method for detecting a security compromise of a service module of an operating system running on a computer. At least one native service module... |
SourceID | epo |
SourceType | Open Access Repository |
SubjectTerms | CALCULATING COMPUTING COUNTING ELECTRIC DIGITAL DATA PROCESSING PHYSICS |
Title | Detection of hidden objects in a computer system |
URI | https://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20140318&DB=EPODOC&locale=&CC=US&NR=8677492B2 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1LT8MwDLam8bxBATFeygH1VtFHCt2hQupLExLbxFa029SEVOslnWgRfx8ndIML3CJHshxLjh3nyxeAW445GevkoVWIQFi0FMxigSMs7lK_dLnj-UyjLcb3o5w-LfxFD6rNWxjNE_qpyRExojjGe6v36_VPEyvR2MrmjlUoqh-zeZiY3elYkc9hOCdRmE4nySQ24zjMZ-b4JVS0bXToRrhb76gqWtHsp6-RepSy_p1RsiPYnaIy2R5DT0gDDuLNx2sG7D93990G7GmAJm9Q2AVhcwI2mqYBVJLUJVkpDhAcMdVQaUglSUF491UD-eZpPgWSpfN4ZKERy-2Cl_lsa653Bn1ZS3EOpLSLQjyg8dzhlNs-88vC47ZgNOBYhbwNYPCnmot_5i7hUHlOAauc4Ar67fuHuMZM27Ib7aMvU3eDRQ |
link.rule.ids | 230,309,786,891,25594,76906 |
linkProvider | European Patent Office |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV3dT4MwEL8s82O-6dQ4P_tgeCPCAMceiAkwMnVjiwOzN0K7EnmBRTD--14rm77oW3NNLtdLrndtf_0dwC3DnIx18lBNuc1VM-NUpbbOVdY3razPdMOiEm0R3o9j82lpLVuQb_7CSJ7QT0mOiBHFMN5ruV-vfy6xfImtrO5ojqLyIYgcX2lOx4J8DsPZd53RfObPPMXznHihhC-OoG0zh30Xd-udgSDnFZXTqys-pax_Z5TgEHbnqKyoj6DFiy50vE3jtS7sT5v37i7sSYAmq1DYBGF1DBqaJgFUBSkz8iY4QHBExYVKRfKCpIQ1rRrIN0_zCZBgFHljFY1ItgtO4sXWXOMU2kVZ8DMgmZamfIBHAKYzk2kWtbLUYBqnps2wCln1oPenmvN_5m6gM46mk2TyGD5fwIHwogBZ6fYltOv3D36FWbem19JfX59qhjI |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Apatent&rft.title=Detection+of+hidden+objects+in+a+computer+system&rft.inventor=RUSAKOV+VYACHESLAV+E&rft.date=2014-03-18&rft.externalDBID=B2&rft.externalDocID=US8677492B2 |