Patents by Inventor Andrey V. Sobko

Andrey V. Sobko has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10372900
    Abstract: Disclosed are system and method for executing calls to a file system of a computer. An exemplary method comprises intercepting, by a software agent, a call to the file system; determining one or more parameters of the call that identify its functionality; determining a priority of executing the call based on the one or more parameters; storing information about the call, the parameters and the priority into a database; selecting from the database, one or more calls for execution based at least in part on relative priorities of execution of the plurality of calls stored in the database; determining whether to execute or not to execute a selected call based on whether the selected call interferes with execution of an earlier selected call; and when the selected call does not interfere with execution of an earlier selected call, passing the selected call to the file system for execution.
    Type: Grant
    Filed: February 10, 2016
    Date of Patent: August 6, 2019
    Assignee: AO Kaspersky Lab
    Inventors: Vyacheslav I. Levchenko, Andrey V. Sobko, Konstantin Y. Manurin, Vladimir V. Strogov
  • Publication number: 20170177859
    Abstract: Disclosed are system and method for executing calls to a file system of a computer. An exemplary method comprises intercepting, by a software agent, a call to the file system; determining one or more parameters of the call that identify its functionality; determining a priority of executing the call based on the one or more parameters; storing information about the call, the parameters and the priority into a database; selecting from the database, one or more calls for execution based at least in part on relative priorities of execution of the plurality of calls stored in the database; determining whether to execute or not to execute a selected call based on whether the selected call interferes with execution of an earlier selected call; and when the selected call does not interfere with execution of an earlier selected call, passing the selected call to the file system for execution.
    Type: Application
    Filed: February 10, 2016
    Publication date: June 22, 2017
    Inventors: Vyacheslav I. Levchenko, Andrey V. Sobko, Konstantin Y. Manurin, Vladimir V. Strogov
  • Patent number: 9552478
    Abstract: A portable information device (PID) having a security module that conducts security-related functionality. At least some of the security-related functionality for the benefit of the PID is provided by a security team of at least one other PID. In one type of arrangement, when configured in a team processing mode, certain ones of the security functions or components operating for the benefit of the PID can be processed on one or more of the security team member devices. In another type of arrangement, the team of devices exchanges security-related information determined as a result of a single team member device's processing of one or more security-related tasks.
    Type: Grant
    Filed: July 9, 2010
    Date of Patent: January 24, 2017
    Assignee: AO KASPERSKY LAB
    Inventors: Andrey V. Sobko, Anton V. Tikhomirov, Nadezhda V. Kashchenko, Dmitry A. Polyakov, Magnus Kalkuhl
  • Patent number: 9436824
    Abstract: Disclosed are system and method for performing antivirus scans of files. An exemplary method includes detecting, by an antivirus application executed by a hardware processor, opening of a file for writing of data to the file; performing, by the antivirus application, antivirus scan of at least a portion of the file; when the file is determined to be clean, obtaining a record of antivirus scans of the file; determining from the record a number of performed antivirus scans on the file by the antivirus application and a maximum number of required antivirus scans; when the number of performed antivirus scans is below the maximum number of required antivirus scans, continue antivirus scans of the file by the antivirus application; and when the number of performed antivirus scan is equal to the maximum number of required antivirus scans, discontinue antivirus scans of the file by the antivirus application.
    Type: Grant
    Filed: March 15, 2016
    Date of Patent: September 6, 2016
    Assignee: AO Kaspersky Lab
    Inventors: Vyacheslav I. Levchenko, Andrey V. Sobko
  • Patent number: 9094451
    Abstract: An initial trust status is assigned to a first object, the trust status representing one of either a relatively higher trust level or a relatively lower trust level. Based on the trust status, the first object is associated with an event type to be monitored, where the event type is selected from among: essential events, occurrence of which is informative as to trust status evaluating for an object, and critical events, including the essential events, and additional events, occurrence of which is informative as to execution of suspicious code. Occurrences of events relating to the first object are monitored. In response to the first object being assigned the relatively higher trust level, only the essential events are monitored. In response to the first object being assigned the relatively lower trust level, the critical events are monitored. A need for performing malware analysis is determined based on the trust status of the first object and the event type.
    Type: Grant
    Filed: August 1, 2014
    Date of Patent: July 28, 2015
    Assignee: KASPERSKY LAB ZAO
    Inventors: Andrey V. Sobko, Maxim V. Yudin, Pavel N. Mezhuev, Ilya B. Godunov, Maxim A. Shiroky
  • Publication number: 20150163231
    Abstract: An initial trust status is assigned to a first object, the trust status representing one of either a relatively higher trust level or a relatively lower trust level. Based on the trust status, the first object is associated with an event type to be monitored, where the event type is selected from among: essential events, occurrence of which is informative as to trust status evaluating for an object, and critical events, including the essential events, and additional events, occurrence of which is informative as to execution of suspicious code. Occurrences of events relating to the first object are monitored. In response to the first object being assigned the relatively higher trust level, only the essential events are monitored. In response to the first object being assigned the relatively lower trust level, the critical events are monitored. A need for performing malware analysis is determined based on the trust status of the first object and the event type.
    Type: Application
    Filed: August 1, 2014
    Publication date: June 11, 2015
    Inventors: Andrey V. Sobko, Maxim V. Yudin, Pavel N. Mezhuev, Ilya B. Godunov, Maxim A. Shiroky
  • Patent number: 9049228
    Abstract: An initial trust status is assigned to a first object, the trust status representing one of either a relatively higher trust level or a relatively lower trust level. Based on the trust status, the first object is associated with an event type to be monitored, where the event type is selected from among: essential events, occurrence of which is informative as to trust status evaluating for an object, and critical events, including the essential events, and additional events, occurrence of which is informative as to execution of suspicious code. Occurrences of events relating to the first object are monitored. In response to the first object being assigned the relatively higher trust level, only the essential events are monitored. In response to the first object being assigned the relatively lower trust level, the critical events are monitored. A need for performing malware analysis is determined based on the trust status of the first object and the event type.
    Type: Grant
    Filed: August 1, 2014
    Date of Patent: June 2, 2015
    Assignee: KASPERSKY LAB ZAO
    Inventors: Andrey V. Sobko, Maxim V. Yudin, Pavel N. Mezhuev, Ilya B. Godunov, Maxim A. Shiroky
  • Patent number: 8935791
    Abstract: A method for asynchronous processing of system calls, including detecting a system call on a computer system; filtering the system call to determine when the system call call matches a filter parameter; making a copy of the system call and asynchronously asynchronously processing the system call copy, if the system call does not pass through at through at least one filter, and the filter parameter does not match the system call; placing placing the system call into a queue; releasing the system call after an anti-virus (AV) (AV) check of the system call copy and terminating an object that caused the system call call when the AV check reveals that the system call is malicious; and for an object associated with the system call that has behavior differences compared to a previous known known non-malicious version of the object but also similarities to the previous known non-known non-malicious object, classifying the object as non-malicious.
    Type: Grant
    Filed: August 7, 2013
    Date of Patent: January 13, 2015
    Assignee: Kasperksy Lab, ZAO
    Inventors: Vladislav V. Martynenko, Andrey V. Sobko
  • Publication number: 20130326626
    Abstract: A method for asynchronous processing of system calls, including detecting a system call on a computer system; filtering the system call to determine when the system call call matches a filter parameter; making a copy of the system call and asynchronously asynchronously processing the system call copy, if the system call does not pass through at through at least one filter, and the filter parameter does not match the system call; placing placing the system call into a queue; releasing the system call after an anti-virus (AV) (AV) check of the system call copy and terminating an object that caused the system call call when the AV check reveals that the system call is malicious; and for an object associated with the system call that has behavior differences compared to a previous known known non-malicious version of the object but also similarities to the previous known non-known non-malicious object, classifying the object as non-malicious.
    Type: Application
    Filed: August 7, 2013
    Publication date: December 5, 2013
    Applicant: Kaspersky Lab, ZAO
    Inventors: VLADISLAV V. MARTYNENKO, ANDREY V. SOBKO
  • Patent number: 8566943
    Abstract: A system, method and computer program product for malware detection based on the behavior of applications running on a computer system, including: asynchronous processing of system events for malware threat analysis using application filters; analyzing events using heuristic and signature data; analyzing applications behavior and detecting abnormal behavior of “clean” applications; automatically classifying applications (i.e., detecting new versions) based on behavior analysis; automatically analyzing the reliability of web sites based on behavior triggered by the web site accesses; in enterprise networks, detecting abnormalities in configuration of user computer systems; recognizing a user by his behavior profile and using the profile for an automatic configuration of user applications.
    Type: Grant
    Filed: November 13, 2009
    Date of Patent: October 22, 2013
    Assignee: Kaspersky Lab, ZAO
    Inventors: Vladislav V. Martynenko, Andrey V. Sobko
  • Publication number: 20110289308
    Abstract: A portable information device (PID) having a security module that conducts security-related functionality. At least some of the security-related functionality for the benefit of the PID is provided by a security team of at least one other PID. In one type of arrangement, when configured in a team processing mode, certain ones of the security functions or components operating for the benefit of the PID can be processed on one or more of the security team member devices. In another type of arrangement, the team of devices exchanges security-related information determined as a result of a single team member device's processing of one or more security-related tasks.
    Type: Application
    Filed: July 9, 2010
    Publication date: November 24, 2011
    Inventors: Andrey V. Sobko, Anton V. Tikhomirov, Nadezhda V. Kashchenko, Dmitry A. Polyakov, Magnus Kalkuhl
  • Patent number: 8051485
    Abstract: A system and method for optimizing a process of synchronization of a database of files checked by an anti-virus (AV) application implemented as a special AV driver. The database is updated by a special interface application using a log file and the AV driver cache. The AV driver monitors modifications of the files and records modification-related information in the context of the modified files. The AV driver creates and maintains a log of modified files. The AV driver supports a circular cache containing minimal required information about the modified files. This information is used for identification of the modified files by an application providing an interface between the AV driver and the database of checked files.
    Type: Grant
    Filed: August 27, 2009
    Date of Patent: November 1, 2011
    Assignee: Kaspersky Lab, ZAO
    Inventors: Andrey V. Sobko, Konstantin Y. Manurin
  • Publication number: 20110083176
    Abstract: A system, method and computer program product for malware detection based on the behavior of applications running on a computer system, including: asynchronous processing of system events for malware threat analyses using application filters; analyzing events using heuristic and signature data; analyzing applications behavior and detecting abnormal behavior of “clean” applications; automatically classifying applications (i.e., detecting new versions) based on behavior analysis; automatically analyzing the reliability of web sites based on behavior triggered by the web site accesses; in enterprise networks, detecting abnormalities in configuration of user computer systems; recognizing a user by his behavior profile and using the profile for an automatic configuration of user applications.
    Type: Application
    Filed: November 13, 2009
    Publication date: April 7, 2011
    Applicant: KASPERSKY LAB, ZAO
    Inventors: VLADISLAV V. MARTYNENKO, ANDREY V. SOBKO
  • Patent number: 7921461
    Abstract: A system, method and computer program product for system for detecting a rootkit on a computer having an operating system, including a native application in ring 0 which, when the operating system is in a trusted state upon a reboot of the computer, after loading of the boot drivers but before loading of non-boot drivers, generates a first snapshot for selected files of the operating system and for a registry; the first snapshot being stored on a persistent storage medium of the computer; a second snapshot for the selected files and for the registry generated by the ordinary application after the loading of the non-boot drivers, generating; means for comparing the second snapshot with the first snapshot; and upon detecting, in the comparing step, one of a masked file and a masked registry branch, means for informing a user of possible rootkit presence on the computer.
    Type: Grant
    Filed: January 16, 2007
    Date of Patent: April 5, 2011
    Assignee: Kaspersky Lab, ZAO
    Inventors: Andrey V. Golchikov, Andrey V. Sobko
  • Patent number: 7620992
    Abstract: Malicious behavior of a computer program is detected using an emulation engine, an event detector and an event analyzer. The emulation engine includes a system emulator configured to emulate, in an isolated computer environment, at least a part of a computer system and a program emulator configured to emulate in the isolated computer environment execution of the computer program, including execution of a plurality of executable components of the computer program, such as execution processes and threads. The event detector is configured to monitor events being generated by two or more of the executable components. The event analyzer is configured to determine, substantially in real time, based at least on one or more events generated by each of two or more of the plurality of executable components whether or not the computer program exhibits malicious behavior, wherein individually one or more of the plurality of executable components may exhibit benign behavior.
    Type: Grant
    Filed: October 2, 2007
    Date of Patent: November 17, 2009
    Assignee: Kaspersky Lab ZAO
    Inventors: Alexey V. Monastyrsky, Andrey V. Sobko, Mikhail A. Pavlyushchik
  • Patent number: 7614084
    Abstract: Malicious behavior of a computer program is detected using an emulation engine, an event detector and an event analyzer. The emulation engine includes a system emulator configured to emulate, in an isolated computer environment, at least a part of a computer system and a program emulator configured to emulate in the isolated computer environment execution of the computer program, including execution of a plurality of executable components of the computer program, such as execution processes and threads. The event detector is configured to monitor events being generated by two or more of the executable components. The event analyzer is configured to determine, substantially in real time, based at least on one or more events generated by each of two or more of the plurality of executable components whether or not the computer program exhibits malicious behavior, wherein individually one or more of the plurality of executable components may exhibit benign behavior.
    Type: Grant
    Filed: October 2, 2007
    Date of Patent: November 3, 2009
    Assignee: Kaspersky Lab ZAO
    Inventors: Alexey V. Monastyrsky, Andrey V. Sobko, Mikhail A. Pavlyushchik
  • Patent number: 7591019
    Abstract: A system and method for optimizing a process of synchronization of a database of files checked by an anti-virus (AV) application implemented as a special AV driver. The database is updated by a special interface application using a log file and the AV driver cache. The AV driver monitors modifications of the files and records modification-related information in the context of the modified files. The AV driver creates and maintains a log of modified files. The AV driver supports a circular cache containing minimal required information about the modified files. This information is used for identification of the modified files by an application providing an interface between the AV driver and the database of checked files.
    Type: Grant
    Filed: April 1, 2009
    Date of Patent: September 15, 2009
    Assignee: Kaspersky Lab, ZAO
    Inventors: Andrey V. Sobko, Konstantin Y. Manurin
  • Patent number: 7559086
    Abstract: Malicious behavior of a computer program is detected using an emulation engine, an event detector and an event analyzer. The emulation engine includes a system emulator configured to emulate, in an isolated computer environment, at least a part of a computer system and a program emulator configured to emulate in the isolated computer environment execution of the computer program, including execution of a plurality of executable components of the computer program, such as execution processes and threads. The event detector is configured to monitor events being generated by two or more of the executable components. The event analyzer is configured to determine, substantially in real time, based at least on one or more events generated by each of two or more of the plurality of executable components whether or not the computer program exhibits malicious behavior, wherein individually one or more of the plurality of executable components may exhibit benign behavior.
    Type: Grant
    Filed: October 2, 2007
    Date of Patent: July 7, 2009
    Assignee: Kaspersky Lab, ZAO
    Inventors: Andrey V. Sobko, Mikhail A. Pavlyushchik
  • Publication number: 20090126015
    Abstract: Malicious behavior of a computer program is detected using an emulation engine, an event detector and an event analyzer. The emulation engine includes a system emulator configured to emulate, in an isolated computer environment, at least a part of a computer system and a program emulator configured to emulate in the isolated computer environment execution of the computer program, including execution of a plurality of executable components of the computer program, such as execution processes and threads. The event detector is configured to monitor events being generated by two or more of the executable components. The event analyzer is configured to determine, substantially in real time, based at least on one or more events generated by each of two or more of the plurality of executable components whether or not the computer program exhibits malicious behavior, wherein individually one or more of the plurality of executable components may exhibit benign behavior.
    Type: Application
    Filed: October 2, 2007
    Publication date: May 14, 2009
    Inventors: Alexey V. Monastyrsky, Andrey V. Sobko, Mikhail A. Pavlyushchik
  • Publication number: 20090089878
    Abstract: Malicious behavior of a computer program is detected using an emulation engine, an event detector and an event analyzer. The emulation engine includes a system emulator configured to emulate, in an isolated computer environment, at least a part of a computer system and a program emulator configured to emulate in the isolated computer environment execution of the computer program, including execution of a plurality of executable components of the computer program, such as execution processes and threads. The event detector is configured to monitor events being generated by two or more of the executable components. The event analyzer is configured to determine, substantially in real time, based at least on one or more events generated by each of two or more of the plurality of executable components whether or not the computer program exhibits malicious behavior, wherein individually one or more of the plurality of executable components may exhibit benign behavior.
    Type: Application
    Filed: January 22, 2008
    Publication date: April 2, 2009
    Inventors: Alexey V. Monastyrsky, Andrey V. Sobko, Mikhail A. Pavlyushchik