Patents by Inventor Anton M. Ivanov

Anton M. Ivanov has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10339312
    Abstract: A method and system is provided for detecting malicious compound files. An example method includes: obtaining at least one compound file; identifying a first set of features of the at least one compound file including features associated with a header of the at least one compound file; subsequent to identifying the first set of features, identifying, by the processor, a second set of features of the at least one compound file including features associated with at least one directory of the at least one compound file; determining a hash sum of the at least one compound file based on the first and second set of features; comparing the hash sum of the at least one compound file with information associated with a plurality of compound files stored in a database; and identifying the at least one compound file as being malicious, trusted or untrusted based at least on comparison results.
    Type: Grant
    Filed: January 20, 2017
    Date of Patent: July 2, 2019
    Assignee: AO KASPERSKY LAB
    Inventors: Andrey V. Krukov, Alexander V. Liskin, Anton M. Ivanov
  • Patent number: 10013555
    Abstract: Disclosed are method and system for detecting harmful files executed by a virtual stack machine. An example method includes: analyzing a file executable on the virtual stack machine to identify both parameters of a file section of the file and parameters of a function of the virtual stack machine when executing the file; identifying, in a database, at least one cluster of safe files based on the identified parameters of the file section of the file and the identified parameters of the virtual stack machine; creating, using at least one clustering rule, a data cluster based on the identified at least one cluster of safe files; calculating at least one checksum of the created data cluster; and determining that the file executable on the virtual stack machine is harmful if the computed at least one checksum matches a checksum in a database of checksums of harmful files.
    Type: Grant
    Filed: June 14, 2016
    Date of Patent: July 3, 2018
    Assignee: AO KASPERSKY LAB
    Inventors: Anton M. Ivanov, Alexander V. Liskin
  • Publication number: 20180101682
    Abstract: A method and system is provided for detecting malicious compound files. An example method includes: obtaining at least one compound file; identifying a first set of features of the at least one compound file including features associated with a header of the at least one compound file; subsequent to identifying the first set of features, identifying, by the processor, a second set of features of the at least one compound file including features associated with at least one directory of the at least one compound file; determining a hash sum of the at least one compound file based on the first and second set of features; comparing the hash sum of the at least one compound file with information associated with a plurality of compound files stored in a database; and identifying the at least one compound file as being malicious, trusted or untrusted based at least on comparison results.
    Type: Application
    Filed: January 20, 2017
    Publication date: April 12, 2018
    Inventors: Andrey V. Krukov, Alexander V. Liskin, Anton M. Ivanov
  • Patent number: 9648032
    Abstract: Disclosed are exemplary aspects of systems and methods for blocking execution of scripts. An exemplary method comprises: intercepting a request for a script from a client to a server; generating a bytecode of the intercepted script; computing a hash sum of the generated bytecode; determining a degree of similarity between the hash sum of the bytecode and a plurality of hash sums of malicious and clean scripts stored in a database; identifying a similar hash sum from the database whose degree of similarity with the hash sum of the bytecode is within a threshold of similarity; determining a coefficient of trust of the similar hash sum; determining whether the requested script is malicious based on the degree of similarity and the coefficient of trust of the similar hash sum; and blocking the execution of the malicious script on the client.
    Type: Grant
    Filed: March 7, 2016
    Date of Patent: May 9, 2017
    Assignee: AO Kaspersky Lab
    Inventors: Vasily A. Davydov, Anton M. Ivanov, Roman Y. Gavrilchenko, Dmitry V. Vinogradov
  • Publication number: 20170093893
    Abstract: Disclosed are exemplary aspects of systems and methods for blocking execution of scripts. An exemplary method comprises: intercepting a request for a script from a client to a server; generating a bytecode of the intercepted script; computing a hash sum of the generated bytecode; determining a degree of similarity between the hash sum of the bytecode and a plurality of hash sums of malicious and clean scripts stored in a database; identifying a similar hash sum from the database whose degree of similarity with the hash sum of the bytecode is within a threshold of similarity; determining a coefficient of trust of the similar hash sum; determining whether the requested script is malicious based on the degree of similarity and the coefficient of trust of the similar hash sum; and blocking the execution of the malicious script on the client.
    Type: Application
    Filed: March 7, 2016
    Publication date: March 30, 2017
    Inventors: Vasily A. Davydov, Anton M. Ivanov, Roman Y. Gavrilchenko, Dmitry V. Vinogradov
  • Publication number: 20170004310
    Abstract: Disclosed are method and system for detecting harmful files executed by a virtual stack machine. An example method includes: analyzing a file executable on the virtual stack machine to identify both parameters of a file section of the file and parameters of a function of the virtual stack machine when executing the file; identifying, in a database, at least one cluster of safe files based on the identified parameters of the file section of the file and the identified parameters of the virtual stack machine; creating, using at least one clustering rule, a data cluster based on the identified at least one cluster of safe files; calculating at least one checksum of the created data cluster; and determining that the file executable on the virtual stack machine is harmful if the computed at least one checksum matches a checksum in a database of checksums of harmful files.
    Type: Application
    Filed: June 14, 2016
    Publication date: January 5, 2017
    Inventors: Anton M. Ivanov, Alexander V. Liskin
  • Patent number: 9513889
    Abstract: Disclosed are systems, methods and computer program products for automating installation of applications. In one aspect, the system launches an application installer of a software application; identifies control elements in an active window of the application installer, wherein the control elements include at least user interface (UI) elements responsible for transitioning the active window to another window of the application installer; transitions to other windows of the application installer and identifies control elements in all other windows of the application installer until the application is installed; generates an automatic installation rule for the application that automatically activates one or more windows of the application installer and one or more control elements of said window to install the application without a participation of a user.
    Type: Grant
    Filed: March 5, 2014
    Date of Patent: December 6, 2016
    Assignee: AO Kaspersky Lab
    Inventor: Anton M. Ivanov
  • Patent number: 9497218
    Abstract: Disclosed are exemplary aspects of systems and methods for detection of phishing scripts. An exemplary method comprises: generating a bytecode of a script; computing a hash sum of the generated bytecode; determining a degree of similarity between the hash sum of the bytecode and hash sums in one or more groups of hash sums of known phishing scripts; identifying at least one group of hash sums that contains a hash sum whose degree of similarity with the hash sum of the bytecode is within a threshold; determining a coefficient of compactness of the identified group of hash sums and a coefficient of trust of the identified group of hash sums; and determining whether the script is a phishing script based on the degree of similarity, the coefficient of compactness and the coefficient of trust.
    Type: Grant
    Filed: March 7, 2016
    Date of Patent: November 15, 2016
    Assignee: AO Kaspersky Lab
    Inventors: Vasily A. Davydov, Anton M. Ivanov, Roman Y. Gavrilchenko, Dmitry V. Vinogradov
  • Patent number: 9396334
    Abstract: Disclosed are method and system for detecting harmful files executed by a virtual stack machine. An example method includes: identifying data from a file executed on the virtual stack machine, the data including parameters of a file section of the file and/or parameters of a function of the file; searching in a database for at least one cluster of safe files that contains at least one of: a value of the parameters of the file section exceeding a first threshold, and a value of the parameters of the function exceeding a second threshold; creating a cluster of data of the file based on the identified cluster of safe files; calculating a checksum of the created cluster of data of the file; and determining that the file is a harmful file if the computed checksum matches a checksum in a database of checksums of harmful files.
    Type: Grant
    Filed: August 24, 2015
    Date of Patent: July 19, 2016
    Assignee: AO Kaspersky Lab
    Inventors: Anton M. Ivanov, Alexander V. Liskin
  • Patent number: 9348998
    Abstract: Disclosed are systems, methods and computer program products for detection of harmful files of different formats. An example method includes: receiving a suspicious file; determining a file format of the suspicious file; determining, using antivirus software, if the suspicious file is clean or harmful; and when the antivirus software fails to determine whether the suspicious file is clean or harmful, selecting, based on at least the file format of the suspicious file, a configuration of a virtual machine for analyzing a maliciousness of the suspicious file by at least: selecting a program associated with the file format of the suspicious file, opening the suspicious file using the associated program in the virtual machine, collecting data of at least one activity on the virtual machine, and analyzing the data to determine the maliciousness of the suspicious file.
    Type: Grant
    Filed: March 9, 2015
    Date of Patent: May 24, 2016
    Assignee: AO Kaspersky Lab
    Inventors: Vyacheslav V. Zakorzhevsky, Evgeny A. Aseev, Andrey V. Krukov, Anton M. Ivanov
  • Publication number: 20150356291
    Abstract: Disclosed are systems, methods and computer program products for detection of harmful files of different formats. An example method includes: receiving a suspicious file; determining a file format of the suspicious file; determining, using antivirus software, if the suspicious file is dean or harmful; and when the antivirus software fails to determine whether the suspicious file is clean or harmful, selecting, based on at least the file format of the suspicious file, a configuration of a virtual machine for analyzing a maliciousness of the suspicious file by at least: selecting a program associated with the file format of the suspicious file, opening the suspicious file using the associated program in the virtual machine, collecting data of at least one activity on the virtual machine, and analyzing the data to determine the maliciousness of the suspicious file.
    Type: Application
    Filed: March 9, 2015
    Publication date: December 10, 2015
    Inventors: Vyacheslav V. Zakorzhevsky, Evgeny A. Aseev, Andrey V. Krukov, Anton M. Ivanov
  • Publication number: 20150186126
    Abstract: Disclosed are systems, methods and computer program products for automating installation of applications. In one aspect, the system launches an application installer of a software application; identifies control elements in an active window of the application installer, wherein the control elements include at least user interface (UI) elements responsible for transitioning the active window to another window of the application installer; transitions to other windows of the application installer and identifies control elements in all other windows of the application installer until the application is installed; generates an automatic installation rule for the application that automatically activates one or more windows of the application installer and one or more control elements of said window to install the application without a participation of a user.
    Type: Application
    Filed: March 5, 2014
    Publication date: July 2, 2015
    Applicant: Kaspersky Lab ZAO
    Inventor: Anton M. Ivanov
  • Patent number: 9015814
    Abstract: Disclosed are systems, methods and computer program products for detection of harmful files of different formats. An example method includes determining a suspicious file and a file format of the suspicious file; analyzing the suspicious file by an antivirus software to determine whether the suspicious file is clean or harmful; when the suspicious file is determined to be harmful by the antivirus software, generating a signature of the suspicious file and updating a collection of harmful files with the signature of the suspicious file; and when the suspicious file is not determined to be clean or harmful by the antivirus software, selecting, based on at least the file format of the suspicious file, a configuration of a virtual machine for analysis of the suspicious file, and analyzing the suspicious file by the virtual machine with selected configuration to determine whether the suspicious file is clean or harmful.
    Type: Grant
    Filed: June 10, 2014
    Date of Patent: April 21, 2015
    Inventors: Vyacheslav V. Zakorzhevsky, Evgeny A. Aseev, Andrey V. Krukov, Anton M. Ivanov