Patents by Inventor Andrey V. Sobko
Andrey V. Sobko has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10372900Abstract: Disclosed are system and method for executing calls to a file system of a computer. An exemplary method comprises intercepting, by a software agent, a call to the file system; determining one or more parameters of the call that identify its functionality; determining a priority of executing the call based on the one or more parameters; storing information about the call, the parameters and the priority into a database; selecting from the database, one or more calls for execution based at least in part on relative priorities of execution of the plurality of calls stored in the database; determining whether to execute or not to execute a selected call based on whether the selected call interferes with execution of an earlier selected call; and when the selected call does not interfere with execution of an earlier selected call, passing the selected call to the file system for execution.Type: GrantFiled: February 10, 2016Date of Patent: August 6, 2019Assignee: AO Kaspersky LabInventors: Vyacheslav I. Levchenko, Andrey V. Sobko, Konstantin Y. Manurin, Vladimir V. Strogov
-
Publication number: 20170177859Abstract: Disclosed are system and method for executing calls to a file system of a computer. An exemplary method comprises intercepting, by a software agent, a call to the file system; determining one or more parameters of the call that identify its functionality; determining a priority of executing the call based on the one or more parameters; storing information about the call, the parameters and the priority into a database; selecting from the database, one or more calls for execution based at least in part on relative priorities of execution of the plurality of calls stored in the database; determining whether to execute or not to execute a selected call based on whether the selected call interferes with execution of an earlier selected call; and when the selected call does not interfere with execution of an earlier selected call, passing the selected call to the file system for execution.Type: ApplicationFiled: February 10, 2016Publication date: June 22, 2017Inventors: Vyacheslav I. Levchenko, Andrey V. Sobko, Konstantin Y. Manurin, Vladimir V. Strogov
-
Patent number: 9552478Abstract: A portable information device (PID) having a security module that conducts security-related functionality. At least some of the security-related functionality for the benefit of the PID is provided by a security team of at least one other PID. In one type of arrangement, when configured in a team processing mode, certain ones of the security functions or components operating for the benefit of the PID can be processed on one or more of the security team member devices. In another type of arrangement, the team of devices exchanges security-related information determined as a result of a single team member device's processing of one or more security-related tasks.Type: GrantFiled: July 9, 2010Date of Patent: January 24, 2017Assignee: AO KASPERSKY LABInventors: Andrey V. Sobko, Anton V. Tikhomirov, Nadezhda V. Kashchenko, Dmitry A. Polyakov, Magnus Kalkuhl
-
Patent number: 9436824Abstract: Disclosed are system and method for performing antivirus scans of files. An exemplary method includes detecting, by an antivirus application executed by a hardware processor, opening of a file for writing of data to the file; performing, by the antivirus application, antivirus scan of at least a portion of the file; when the file is determined to be clean, obtaining a record of antivirus scans of the file; determining from the record a number of performed antivirus scans on the file by the antivirus application and a maximum number of required antivirus scans; when the number of performed antivirus scans is below the maximum number of required antivirus scans, continue antivirus scans of the file by the antivirus application; and when the number of performed antivirus scan is equal to the maximum number of required antivirus scans, discontinue antivirus scans of the file by the antivirus application.Type: GrantFiled: March 15, 2016Date of Patent: September 6, 2016Assignee: AO Kaspersky LabInventors: Vyacheslav I. Levchenko, Andrey V. Sobko
-
Patent number: 9094451Abstract: An initial trust status is assigned to a first object, the trust status representing one of either a relatively higher trust level or a relatively lower trust level. Based on the trust status, the first object is associated with an event type to be monitored, where the event type is selected from among: essential events, occurrence of which is informative as to trust status evaluating for an object, and critical events, including the essential events, and additional events, occurrence of which is informative as to execution of suspicious code. Occurrences of events relating to the first object are monitored. In response to the first object being assigned the relatively higher trust level, only the essential events are monitored. In response to the first object being assigned the relatively lower trust level, the critical events are monitored. A need for performing malware analysis is determined based on the trust status of the first object and the event type.Type: GrantFiled: August 1, 2014Date of Patent: July 28, 2015Assignee: KASPERSKY LAB ZAOInventors: Andrey V. Sobko, Maxim V. Yudin, Pavel N. Mezhuev, Ilya B. Godunov, Maxim A. Shiroky
-
Publication number: 20150163231Abstract: An initial trust status is assigned to a first object, the trust status representing one of either a relatively higher trust level or a relatively lower trust level. Based on the trust status, the first object is associated with an event type to be monitored, where the event type is selected from among: essential events, occurrence of which is informative as to trust status evaluating for an object, and critical events, including the essential events, and additional events, occurrence of which is informative as to execution of suspicious code. Occurrences of events relating to the first object are monitored. In response to the first object being assigned the relatively higher trust level, only the essential events are monitored. In response to the first object being assigned the relatively lower trust level, the critical events are monitored. A need for performing malware analysis is determined based on the trust status of the first object and the event type.Type: ApplicationFiled: August 1, 2014Publication date: June 11, 2015Inventors: Andrey V. Sobko, Maxim V. Yudin, Pavel N. Mezhuev, Ilya B. Godunov, Maxim A. Shiroky
-
Patent number: 9049228Abstract: An initial trust status is assigned to a first object, the trust status representing one of either a relatively higher trust level or a relatively lower trust level. Based on the trust status, the first object is associated with an event type to be monitored, where the event type is selected from among: essential events, occurrence of which is informative as to trust status evaluating for an object, and critical events, including the essential events, and additional events, occurrence of which is informative as to execution of suspicious code. Occurrences of events relating to the first object are monitored. In response to the first object being assigned the relatively higher trust level, only the essential events are monitored. In response to the first object being assigned the relatively lower trust level, the critical events are monitored. A need for performing malware analysis is determined based on the trust status of the first object and the event type.Type: GrantFiled: August 1, 2014Date of Patent: June 2, 2015Assignee: KASPERSKY LAB ZAOInventors: Andrey V. Sobko, Maxim V. Yudin, Pavel N. Mezhuev, Ilya B. Godunov, Maxim A. Shiroky
-
Patent number: 8935791Abstract: A method for asynchronous processing of system calls, including detecting a system call on a computer system; filtering the system call to determine when the system call call matches a filter parameter; making a copy of the system call and asynchronously asynchronously processing the system call copy, if the system call does not pass through at through at least one filter, and the filter parameter does not match the system call; placing placing the system call into a queue; releasing the system call after an anti-virus (AV) (AV) check of the system call copy and terminating an object that caused the system call call when the AV check reveals that the system call is malicious; and for an object associated with the system call that has behavior differences compared to a previous known known non-malicious version of the object but also similarities to the previous known non-known non-malicious object, classifying the object as non-malicious.Type: GrantFiled: August 7, 2013Date of Patent: January 13, 2015Assignee: Kasperksy Lab, ZAOInventors: Vladislav V. Martynenko, Andrey V. Sobko
-
Publication number: 20130326626Abstract: A method for asynchronous processing of system calls, including detecting a system call on a computer system; filtering the system call to determine when the system call call matches a filter parameter; making a copy of the system call and asynchronously asynchronously processing the system call copy, if the system call does not pass through at through at least one filter, and the filter parameter does not match the system call; placing placing the system call into a queue; releasing the system call after an anti-virus (AV) (AV) check of the system call copy and terminating an object that caused the system call call when the AV check reveals that the system call is malicious; and for an object associated with the system call that has behavior differences compared to a previous known known non-malicious version of the object but also similarities to the previous known non-known non-malicious object, classifying the object as non-malicious.Type: ApplicationFiled: August 7, 2013Publication date: December 5, 2013Applicant: Kaspersky Lab, ZAOInventors: VLADISLAV V. MARTYNENKO, ANDREY V. SOBKO
-
Patent number: 8566943Abstract: A system, method and computer program product for malware detection based on the behavior of applications running on a computer system, including: asynchronous processing of system events for malware threat analysis using application filters; analyzing events using heuristic and signature data; analyzing applications behavior and detecting abnormal behavior of “clean” applications; automatically classifying applications (i.e., detecting new versions) based on behavior analysis; automatically analyzing the reliability of web sites based on behavior triggered by the web site accesses; in enterprise networks, detecting abnormalities in configuration of user computer systems; recognizing a user by his behavior profile and using the profile for an automatic configuration of user applications.Type: GrantFiled: November 13, 2009Date of Patent: October 22, 2013Assignee: Kaspersky Lab, ZAOInventors: Vladislav V. Martynenko, Andrey V. Sobko
-
Publication number: 20110289308Abstract: A portable information device (PID) having a security module that conducts security-related functionality. At least some of the security-related functionality for the benefit of the PID is provided by a security team of at least one other PID. In one type of arrangement, when configured in a team processing mode, certain ones of the security functions or components operating for the benefit of the PID can be processed on one or more of the security team member devices. In another type of arrangement, the team of devices exchanges security-related information determined as a result of a single team member device's processing of one or more security-related tasks.Type: ApplicationFiled: July 9, 2010Publication date: November 24, 2011Inventors: Andrey V. Sobko, Anton V. Tikhomirov, Nadezhda V. Kashchenko, Dmitry A. Polyakov, Magnus Kalkuhl
-
Patent number: 8051485Abstract: A system and method for optimizing a process of synchronization of a database of files checked by an anti-virus (AV) application implemented as a special AV driver. The database is updated by a special interface application using a log file and the AV driver cache. The AV driver monitors modifications of the files and records modification-related information in the context of the modified files. The AV driver creates and maintains a log of modified files. The AV driver supports a circular cache containing minimal required information about the modified files. This information is used for identification of the modified files by an application providing an interface between the AV driver and the database of checked files.Type: GrantFiled: August 27, 2009Date of Patent: November 1, 2011Assignee: Kaspersky Lab, ZAOInventors: Andrey V. Sobko, Konstantin Y. Manurin
-
Publication number: 20110083176Abstract: A system, method and computer program product for malware detection based on the behavior of applications running on a computer system, including: asynchronous processing of system events for malware threat analyses using application filters; analyzing events using heuristic and signature data; analyzing applications behavior and detecting abnormal behavior of “clean” applications; automatically classifying applications (i.e., detecting new versions) based on behavior analysis; automatically analyzing the reliability of web sites based on behavior triggered by the web site accesses; in enterprise networks, detecting abnormalities in configuration of user computer systems; recognizing a user by his behavior profile and using the profile for an automatic configuration of user applications.Type: ApplicationFiled: November 13, 2009Publication date: April 7, 2011Applicant: KASPERSKY LAB, ZAOInventors: VLADISLAV V. MARTYNENKO, ANDREY V. SOBKO
-
Patent number: 7921461Abstract: A system, method and computer program product for system for detecting a rootkit on a computer having an operating system, including a native application in ring 0 which, when the operating system is in a trusted state upon a reboot of the computer, after loading of the boot drivers but before loading of non-boot drivers, generates a first snapshot for selected files of the operating system and for a registry; the first snapshot being stored on a persistent storage medium of the computer; a second snapshot for the selected files and for the registry generated by the ordinary application after the loading of the non-boot drivers, generating; means for comparing the second snapshot with the first snapshot; and upon detecting, in the comparing step, one of a masked file and a masked registry branch, means for informing a user of possible rootkit presence on the computer.Type: GrantFiled: January 16, 2007Date of Patent: April 5, 2011Assignee: Kaspersky Lab, ZAOInventors: Andrey V. Golchikov, Andrey V. Sobko
-
Patent number: 7620992Abstract: Malicious behavior of a computer program is detected using an emulation engine, an event detector and an event analyzer. The emulation engine includes a system emulator configured to emulate, in an isolated computer environment, at least a part of a computer system and a program emulator configured to emulate in the isolated computer environment execution of the computer program, including execution of a plurality of executable components of the computer program, such as execution processes and threads. The event detector is configured to monitor events being generated by two or more of the executable components. The event analyzer is configured to determine, substantially in real time, based at least on one or more events generated by each of two or more of the plurality of executable components whether or not the computer program exhibits malicious behavior, wherein individually one or more of the plurality of executable components may exhibit benign behavior.Type: GrantFiled: October 2, 2007Date of Patent: November 17, 2009Assignee: Kaspersky Lab ZAOInventors: Alexey V. Monastyrsky, Andrey V. Sobko, Mikhail A. Pavlyushchik
-
Patent number: 7614084Abstract: Malicious behavior of a computer program is detected using an emulation engine, an event detector and an event analyzer. The emulation engine includes a system emulator configured to emulate, in an isolated computer environment, at least a part of a computer system and a program emulator configured to emulate in the isolated computer environment execution of the computer program, including execution of a plurality of executable components of the computer program, such as execution processes and threads. The event detector is configured to monitor events being generated by two or more of the executable components. The event analyzer is configured to determine, substantially in real time, based at least on one or more events generated by each of two or more of the plurality of executable components whether or not the computer program exhibits malicious behavior, wherein individually one or more of the plurality of executable components may exhibit benign behavior.Type: GrantFiled: October 2, 2007Date of Patent: November 3, 2009Assignee: Kaspersky Lab ZAOInventors: Alexey V. Monastyrsky, Andrey V. Sobko, Mikhail A. Pavlyushchik
-
Patent number: 7591019Abstract: A system and method for optimizing a process of synchronization of a database of files checked by an anti-virus (AV) application implemented as a special AV driver. The database is updated by a special interface application using a log file and the AV driver cache. The AV driver monitors modifications of the files and records modification-related information in the context of the modified files. The AV driver creates and maintains a log of modified files. The AV driver supports a circular cache containing minimal required information about the modified files. This information is used for identification of the modified files by an application providing an interface between the AV driver and the database of checked files.Type: GrantFiled: April 1, 2009Date of Patent: September 15, 2009Assignee: Kaspersky Lab, ZAOInventors: Andrey V. Sobko, Konstantin Y. Manurin
-
Patent number: 7559086Abstract: Malicious behavior of a computer program is detected using an emulation engine, an event detector and an event analyzer. The emulation engine includes a system emulator configured to emulate, in an isolated computer environment, at least a part of a computer system and a program emulator configured to emulate in the isolated computer environment execution of the computer program, including execution of a plurality of executable components of the computer program, such as execution processes and threads. The event detector is configured to monitor events being generated by two or more of the executable components. The event analyzer is configured to determine, substantially in real time, based at least on one or more events generated by each of two or more of the plurality of executable components whether or not the computer program exhibits malicious behavior, wherein individually one or more of the plurality of executable components may exhibit benign behavior.Type: GrantFiled: October 2, 2007Date of Patent: July 7, 2009Assignee: Kaspersky Lab, ZAOInventors: Andrey V. Sobko, Mikhail A. Pavlyushchik
-
Publication number: 20090126015Abstract: Malicious behavior of a computer program is detected using an emulation engine, an event detector and an event analyzer. The emulation engine includes a system emulator configured to emulate, in an isolated computer environment, at least a part of a computer system and a program emulator configured to emulate in the isolated computer environment execution of the computer program, including execution of a plurality of executable components of the computer program, such as execution processes and threads. The event detector is configured to monitor events being generated by two or more of the executable components. The event analyzer is configured to determine, substantially in real time, based at least on one or more events generated by each of two or more of the plurality of executable components whether or not the computer program exhibits malicious behavior, wherein individually one or more of the plurality of executable components may exhibit benign behavior.Type: ApplicationFiled: October 2, 2007Publication date: May 14, 2009Inventors: Alexey V. Monastyrsky, Andrey V. Sobko, Mikhail A. Pavlyushchik
-
Publication number: 20090089878Abstract: Malicious behavior of a computer program is detected using an emulation engine, an event detector and an event analyzer. The emulation engine includes a system emulator configured to emulate, in an isolated computer environment, at least a part of a computer system and a program emulator configured to emulate in the isolated computer environment execution of the computer program, including execution of a plurality of executable components of the computer program, such as execution processes and threads. The event detector is configured to monitor events being generated by two or more of the executable components. The event analyzer is configured to determine, substantially in real time, based at least on one or more events generated by each of two or more of the plurality of executable components whether or not the computer program exhibits malicious behavior, wherein individually one or more of the plurality of executable components may exhibit benign behavior.Type: ApplicationFiled: January 22, 2008Publication date: April 2, 2009Inventors: Alexey V. Monastyrsky, Andrey V. Sobko, Mikhail A. Pavlyushchik