Patents by Inventor Alexander V. Liskin

Alexander V. Liskin has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230074997
    Abstract: Disclosed herein are systems and methods for modifying execution environments of applications. In one aspect, an exemplary method comprises, identifying an application that requires an isolated execution environment in order to be analyzed, generating an isolated execution environment to launch the identified application using constraint generating rules from a rules database, launching the application in the isolated execution environment that was generated, when an incorrect execution of the application is detected after the application is launched in the isolated execution environment, stopping the execution of the application and modifying the isolated execution environment using the constraint generating rules from the rule database, and when an incorrect execution of the application is not detected after the application is launched in the isolated execution environment, checking for a presence of a malicious code in the application running in the modified isolated execution environment.
    Type: Application
    Filed: May 17, 2022
    Publication date: March 9, 2023
    Inventors: Alexander V Liskin, Vitaly V. Butuzov
  • Patent number: 10902118
    Abstract: Disclosed are systems and methods for training and retraining a model for detection of malicious activity from container files, which contain at least two or more objects constituting logically separate data regions. Parameters of each object chosen from at least one safe container and one malicious container are determined which uniquely characterize the functional relation of the mentioned object to at least one selected object. Convolutions are formed separately for each container on the basis of the determined parameters of the objects, which are used to train a machine learning model for detecting malicious container files.
    Type: Grant
    Filed: September 7, 2018
    Date of Patent: January 26, 2021
    Assignee: AO KASPERSKY LAB
    Inventors: Vladimir V. Krylov, Alexander V. Liskin, Alexey E. Antonov
  • Patent number: 10878087
    Abstract: Disclosed herein are methods and systems for detecting malicious files using two stage file classification. An exemplary method comprises selecting, by a hardware processor, a set of attributes of a file under analysis, calculating, by the hardware processor, a hash of the file based on the selected set of attributes, selecting, by the hardware processor, a classifier for the file from a set of classifiers based on the calculated hash of the file, assigning, by the hardware processor, the file under analysis to the one or more categories based on the selected classifier, determining whether the file has been assigned to a category of malicious files and concluding that the file is malicious based on the determination.
    Type: Grant
    Filed: November 8, 2018
    Date of Patent: December 29, 2020
    Assignee: AO KASPERSKY LAB
    Inventors: Alexey M. Romanenko, Alexander V. Liskin, Sergey V. Prokudin
  • Patent number: 10867038
    Abstract: A system and method is provided for determining whether an electronic file is malicious. An exemplary method includes extracting resources from an electronic file; forming a first rule that establishes a functional dependency between the extracted resources; identifying, in a database of malicious file resources, a second rule associated with one or more of the extracted resources; comparing the formed first rule with the identified second rule to calculate a degree of similarity between first and second rules; and determining the electronic file to be a malicious file when the calculated degree of similarity exceeds a predetermined threshold value.
    Type: Grant
    Filed: August 4, 2017
    Date of Patent: December 15, 2020
    Assignee: AO KASPERSKY LAB
    Inventors: Vladimir V. Krylov, Alexander V. Liskin
  • Patent number: 10838748
    Abstract: Disclosed are systems and methods for emulating execution of a file based on emulation time. In one aspect, an exemplary method comprises, generating an image of a file, emulating an execution of instructions from the image for a predetermined emulation time, the emulation including: when an emulation of an execution of instruction from an image of another file is needed, generating an image of the another file, detecting known set of instructions in portions read from the image, inserting a break point into a position in the generated image corresponding to a start of the detected set of instructions, emulating execution of the another file by emulating execution of instructions from the generated image, and adding corresponding records to an emulation log, and reading a next portion from the image of the another file and repeating the emulation until the predetermined emulation time has elapsed.
    Type: Grant
    Filed: September 3, 2019
    Date of Patent: November 17, 2020
    Assignee: AO Kaspersky Lab
    Inventors: Alexander V. Liskin, Vladimir V. Krylov
  • Patent number: 10713359
    Abstract: Disclosed are systems and methods for detection of malicious intermediate language files. In one exemplary aspect, the system comprises a database comprising hashes of known malicious files, a resource allocation module configured to select a set of resources from a file being analyzed, a hash calculation module, coupled to the resource allocation module, configured to calculate a perceptive hash of the set of resources; and an analysis module, coupled to the other modules, configured to identify a degree of similarly between the set of resources and a set of resources from known malicious files by comparing the perceptive hash with perceptive hashes of the set of resources from known malicious files, determine a harmfulness of the file being analyzed based on the degree of similarity and remove or quarantine the file being analyzed when the harmfulness exceeds a predetermined threshold.
    Type: Grant
    Filed: March 29, 2018
    Date of Patent: July 14, 2020
    Assignee: AO Kaspersky Lab
    Inventors: Vladimir V. Krylov, Alexander V. Liskin, Alexey E. Antonov
  • Publication number: 20200004956
    Abstract: Disclosed herein are methods and systems for detecting malicious files using two stage file classification. An exemplary method comprises selecting, by a hardware processor, a set of attributes of a file under analysis, calculating, by the hardware processor, a hash of the file based on the selected set of attributes, selecting, by the hardware processor, a classifier for the file from a set of classifiers based on the calculated hash of the file, assigning, by the hardware processor, the file under analysis to the one or more categories based on the selected classifier, determining whether the file has been assigned to a category of malicious files and concluding that the file is malicious based on the determination.
    Type: Application
    Filed: November 8, 2018
    Publication date: January 2, 2020
    Inventors: Alexey M. Romanenko, Alexander V. Liskin, Sergey V. Prokudin
  • Publication number: 20190391830
    Abstract: Disclosed are systems and methods for emulating execution of a file based on emulation time. In one aspect, an exemplary method comprises, generating an image of a file, emulating an execution of instructions from the image for a predetermined emulation time, the emulation including: when an emulation of an execution of instruction from an image of another file is needed, generating an image of the another file, detecting known set of instructions in portions read from the image, inserting a break point into a position in the generated image corresponding to a start of the detected set of instructions, emulating execution of the another file by emulating execution of instructions from the generated image, and adding corresponding records to an emulation log, and reading a next portion from the image of the another file and repeating the emulation until the predetermined emulation time has elapsed.
    Type: Application
    Filed: September 3, 2019
    Publication date: December 26, 2019
    Inventors: Alexander V. Liskin, Vladimir V. Krylov
  • Patent number: 10437618
    Abstract: Disclosed are systems and methods for emulating execution of a file. An image of a file is formed, which is comprised of instructions read from the file. An analysis module detects at least one known set of instructions in a portion read from the file, and inserts a break point into a position in the generated image of the file corresponding to a start of the detected set of instructions. An emulation module emulates execution of the file by emulating execution of instructions from the generated image of the file and adding corresponding records to an emulation log associated with the emulated execution of the at least one known set of instructions.
    Type: Grant
    Filed: October 12, 2017
    Date of Patent: October 8, 2019
    Assignee: AO Kaspersky Lab
    Inventors: Alexander V. Liskin, Vladimir V. Krylov
  • Publication number: 20190243972
    Abstract: Disclosed are systems and methods for training and retraining a model for detection of malicious activity from container files, which contain at least two or more objects constituting logically separate data regions. Parameters of each object chosen from at least one safe container and one malicious container are determined which uniquely characterize the functional relation of the mentioned object to at least one selected object. Convolutions are formed separately for each container on the basis of the determined parameters of the objects, which are used to train a machine learning model for detecting malicious container files.
    Type: Application
    Filed: September 7, 2018
    Publication date: August 8, 2019
    Inventors: Vladimir V. KRYLOV, Alexander V. LISKIN, Alexey E. ANTONOV
  • Patent number: 10339312
    Abstract: A method and system is provided for detecting malicious compound files. An example method includes: obtaining at least one compound file; identifying a first set of features of the at least one compound file including features associated with a header of the at least one compound file; subsequent to identifying the first set of features, identifying, by the processor, a second set of features of the at least one compound file including features associated with at least one directory of the at least one compound file; determining a hash sum of the at least one compound file based on the first and second set of features; comparing the hash sum of the at least one compound file with information associated with a plurality of compound files stored in a database; and identifying the at least one compound file as being malicious, trusted or untrusted based at least on comparison results.
    Type: Grant
    Filed: January 20, 2017
    Date of Patent: July 2, 2019
    Assignee: AO KASPERSKY LAB
    Inventors: Andrey V. Krukov, Alexander V. Liskin, Anton M. Ivanov
  • Publication number: 20190102549
    Abstract: Disclosed are systems and methods for detection of malicious intermediate language files. In one exemplary aspect, the system comprises a database comprising hashes of known malicious files, a resource allocation module configured to select a set of resources from a file being analyzed, a hash calculation module, coupled to the resource allocation module, configured to calculate a perceptive hash of the set of resources; and an analysis module, coupled to the other modules, configured to identify a degree of similarly between the set of resources and a set of resources from known malicious files by comparing the perceptive hash with perceptive hashes of the set of resources from known malicious files, determine a harmfulness of the file being analyzed based on the degree of similarity and remove or quarantine the file being analyzed when the harmfulness exceeds a predetermined threshold.
    Type: Application
    Filed: March 29, 2018
    Publication date: April 4, 2019
    Inventors: Vladimir V. Krylov, Alexander V. Liskin, Alexey E. Antonov
  • Publication number: 20190056963
    Abstract: Disclosed are systems and methods for emulating execution of a file. An image of a file is formed, which is comprised of instructions read from the file. An analysis module detects at least one known set of instructions in a portion read from the file, and inserts a break point into a position in the generated image of the file corresponding to a start of the detected set of instructions. An emulation module emulates execution of the file by emulating execution of instructions from the generated image of the file and adding corresponding records to an emulation log associated with the emulated execution of the at least one known set of instructions.
    Type: Application
    Filed: October 12, 2017
    Publication date: February 21, 2019
    Inventors: Alexander V. Liskin, Vladimir V. Krylov
  • Publication number: 20180365420
    Abstract: A system and method is provided for determining whether an electronic file is malicious. An exemplary method includes extracting resources from an electronic file; forming a first rule that establishes a functional dependency between the extracted resources; identifying, in a database of malicious file resources, a second rule associated with one or more of the extracted resources; comparing the formed first rule with the identified second rule to calculate a degree of similarity between first and second rules; and determining the electronic file to be a malicious file when the calculated degree of similarity exceeds a predetermined threshold value.
    Type: Application
    Filed: August 4, 2017
    Publication date: December 20, 2018
    Inventors: Vladimir V. Krylov, Alexander V. Liskin
  • Patent number: 10013555
    Abstract: Disclosed are method and system for detecting harmful files executed by a virtual stack machine. An example method includes: analyzing a file executable on the virtual stack machine to identify both parameters of a file section of the file and parameters of a function of the virtual stack machine when executing the file; identifying, in a database, at least one cluster of safe files based on the identified parameters of the file section of the file and the identified parameters of the virtual stack machine; creating, using at least one clustering rule, a data cluster based on the identified at least one cluster of safe files; calculating at least one checksum of the created data cluster; and determining that the file executable on the virtual stack machine is harmful if the computed at least one checksum matches a checksum in a database of checksums of harmful files.
    Type: Grant
    Filed: June 14, 2016
    Date of Patent: July 3, 2018
    Assignee: AO KASPERSKY LAB
    Inventors: Anton M. Ivanov, Alexander V. Liskin
  • Publication number: 20180101682
    Abstract: A method and system is provided for detecting malicious compound files. An example method includes: obtaining at least one compound file; identifying a first set of features of the at least one compound file including features associated with a header of the at least one compound file; subsequent to identifying the first set of features, identifying, by the processor, a second set of features of the at least one compound file including features associated with at least one directory of the at least one compound file; determining a hash sum of the at least one compound file based on the first and second set of features; comparing the hash sum of the at least one compound file with information associated with a plurality of compound files stored in a database; and identifying the at least one compound file as being malicious, trusted or untrusted based at least on comparison results.
    Type: Application
    Filed: January 20, 2017
    Publication date: April 12, 2018
    Inventors: Andrey V. Krukov, Alexander V. Liskin, Anton M. Ivanov
  • Publication number: 20170004310
    Abstract: Disclosed are method and system for detecting harmful files executed by a virtual stack machine. An example method includes: analyzing a file executable on the virtual stack machine to identify both parameters of a file section of the file and parameters of a function of the virtual stack machine when executing the file; identifying, in a database, at least one cluster of safe files based on the identified parameters of the file section of the file and the identified parameters of the virtual stack machine; creating, using at least one clustering rule, a data cluster based on the identified at least one cluster of safe files; calculating at least one checksum of the created data cluster; and determining that the file executable on the virtual stack machine is harmful if the computed at least one checksum matches a checksum in a database of checksums of harmful files.
    Type: Application
    Filed: June 14, 2016
    Publication date: January 5, 2017
    Inventors: Anton M. Ivanov, Alexander V. Liskin
  • Patent number: 9444832
    Abstract: Systems and methods for optimizing an antivirus determination for executable files. Optimization by excluding from an antivirus check executable files such as dynamic libraries and/or resource files that do not contain executable code speeds up the overall antivirus determination. An optimization system generally includes an antivirus system. The antivirus system generally includes a check tool and an executable file detection system. The executable file detection system generally includes a breakdown tool, an analysis tool, and a database. The antivirus system can be operably coupled to an antivirus server via the Internet.
    Type: Grant
    Filed: February 4, 2016
    Date of Patent: September 13, 2016
    Assignee: AO KASPERSKY LAB
    Inventors: Andrey V. Ladikov, Alexander V. Liskin
  • Patent number: 9396334
    Abstract: Disclosed are method and system for detecting harmful files executed by a virtual stack machine. An example method includes: identifying data from a file executed on the virtual stack machine, the data including parameters of a file section of the file and/or parameters of a function of the file; searching in a database for at least one cluster of safe files that contains at least one of: a value of the parameters of the file section exceeding a first threshold, and a value of the parameters of the function exceeding a second threshold; creating a cluster of data of the file based on the identified cluster of safe files; calculating a checksum of the created cluster of data of the file; and determining that the file is a harmful file if the computed checksum matches a checksum in a database of checksums of harmful files.
    Type: Grant
    Filed: August 24, 2015
    Date of Patent: July 19, 2016
    Assignee: AO Kaspersky Lab
    Inventors: Anton M. Ivanov, Alexander V. Liskin