Patents by Inventor Maxim Y. Golovkin

Maxim Y. Golovkin has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20180068115
    Abstract: Disclosed are system and method for detecting malicious code in files. One exemplary method comprises: intercepting, by a processor, one or more application program interface (API) calls during an execution of a process launched from a file of a computing device; determining and detecting, by the processor, a presence of an exit condition of the process; in response to detecting the exit condition, identifying one or more signatures of a first type and transferring one or more saved memory dumps of the computing device to an emulator for execution; and determining and identifying a malicious code in the file in response to detecting one or more signatures of a second type based at least upon execution results of the transferred memory dumps of the computing device.
    Type: Application
    Filed: February 13, 2017
    Publication date: March 8, 2018
    Inventors: Maxim Y. Golovkin, Alexey V. Monastyrsky, Vladislav V. Pintiysky, Mikhail A. Pavlyushchik, Vitaly V. Butuzov, Dmitry V. Karasovsky
  • Publication number: 20180052996
    Abstract: Disclosed are a system and method for protecting computers from unauthorized remote administration. One exemplary method includes: intercepting events occurring in the computer system including a first event and a second event associated with data transfer with an application executing in the computer system; determining that the first intercepted event is dependent on the second intercepted event based on parameters of the first intercepted event and the second intercepted event; generating a rule defining a dependency of at least one parameter of the first intercepted event on at least one parameter of the second intercepted event; responsive to determining a degree of similarity of the generated rule and a previously created rule exceeds a threshold value, identifying at least one application as a remote administration application that created the first and second identified intercepted events; and blocking the identified remote administration application from exchanging data with the computer system.
    Type: Application
    Filed: October 16, 2017
    Publication date: February 22, 2018
    Inventors: Maxim Y. Golovkin, Alexey M. Romanenko, Alexey V. Monastyrsky
  • Patent number: 9811661
    Abstract: Disclosed are system and method for protecting computers from unauthorized remote administration. One exemplary method comprises: intercepting events occurred in a computer system; determining parameters of each intercepted event for identifying each intercepted event as being relating to a first data transfer by an application in a computer network or a second data transfer to an application from a peripheral data input device of the computer system; determining two intercepted events as being dependent on each other; determining a rule defining a dependency of the parameters of the two intercepted events; determining a degree of similarity of the rule and a previously created rule; if the degree of similarity exceeding a selected threshold value, identifying at least one application based at least on the rule and the previously created rule; and analyzing the at least one application for detecting a remote administration application.
    Type: Grant
    Filed: December 21, 2016
    Date of Patent: November 7, 2017
    Assignee: AO Kaspersky Lab
    Inventors: Maxim Y. Golovkin, Alexey M. Romanenko, Alexey V. Monastyrsky
  • Patent number: 9679139
    Abstract: A method and system are provided for performing an antivirus scan of a file on a virtual machine. An example method includes performing a first execution of the file on the virtual machine, recording a first log that includes an API function call and an internal event detected during execution, and determining if any signatures in the log are stored in a signatures database. Moreover, if no signatures in the first log are found in the first database of signatures, the file is classified as not malicious. In contrast, if at least one signature is found, a second execution of the file is perform and a second log is recorded that includes a detected internal event. Moreover, the method includes determining if any signatures in the second log are stored in a second database of signatures; and classifying the file as not malicious if no signatures are found.
    Type: Grant
    Filed: May 31, 2016
    Date of Patent: June 13, 2017
    Assignee: AO Kaspersky Lab
    Inventors: Alexey V. Monastyrsky, Vitaly V. Butuzov, Maxim Y. Golovkin, Dmitry V. Karasovsky, Vladislav V. Pintiysky, Denis Y. Kobychev
  • Patent number: 9087195
    Abstract: Disclosed are systems, methods and computer program products for efficient and reliable analysis, optimization and detection of obfuscated malware. One disclosed example method for malware detection includes loading an executable software code on a computer system and disassembling the software code into an assembly language or other low-level programming language. The method then proceeds to simplifying complex assembly instructions and constructing a data flow model of the simplified software code. The dependencies and interrelations of code elements of the data flow model are analyzed to identify obfuscated software codes therein. The identified obfuscated codes are then optimized. Based on the results of optimization, determination is made whether the software code is malicious and/or whether further antimalware analysis of the optimized software code is necessary.
    Type: Grant
    Filed: July 10, 2009
    Date of Patent: July 21, 2015
    Assignee: Kaspersky Lab ZAO
    Inventor: Maxim Y. Golovkin
  • Patent number: 8555392
    Abstract: Disclosed are systems, methods and computer program products for detecting unknown packers and cryptors. An example method comprises emulating execution of a software object modified by an unknown packer or cryptor; collecting information about memory operations performed during the emulation; combining information about a plurality of related memory operations into at least one sequential set of memory operations; identifying from the at least one sequential set of related memory operations one or more high-level operations associated with unpacking or decryption of the emulated object; and generating based on the one or more high-level operations a record of the unknown packer or cryptor to be used for detecting the unknown packer or cryptor.
    Type: Grant
    Filed: June 19, 2012
    Date of Patent: October 8, 2013
    Assignee: Kaspersky Lab Zao
    Inventor: Maxim Y. Golovkin
  • Publication number: 20130227300
    Abstract: Disclosed are systems, methods and computer program products for detecting unknown packers and cryptors. An example method comprises emulating execution of a software object modified by an unknown packer or cryptor; collecting information about memory operations performed during the emulation; combining information about a plurality of related memory operations into at least one sequential set of memory operations; identifying from the at least one sequential set of related memory operations one or more high-level operations associated with unpacking or decryption of the emulated object; and generating based on the one or more high-level operations a record of the unknown packer or cryptor to be used for detecting the unknown packer or cryptor.
    Type: Application
    Filed: June 19, 2012
    Publication date: August 29, 2013
    Inventor: Maxim Y. Golovkin
  • Publication number: 20110010697
    Abstract: Disclosed are systems, methods and computer program products for efficient and reliable analysis, optimization and detection of obfuscated malware. One disclosed example method for malware detection includes loading an executable software code on a computer system and disassembling the software code into an assembly language or other low-level programming language. The method then proceeds to simplifying complex assembly instructions and constructing a data flow model of the simplified software code. The dependencies and interrelations of code elements of the data flow model are analyzed to identify obfuscated software codes therein. The identified obfuscated codes are then optimized. Based on the results of optimization, determination is made whether the software code is malicious and/or whether further antimalware analysis of the optimized software code is necessary.
    Type: Application
    Filed: July 10, 2009
    Publication date: January 13, 2011
    Inventor: Maxim Y. Golovkin