Patents by Inventor Vladislav V. Pintiysky

Vladislav V. Pintiysky has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20170351600
    Abstract: Disclosed are system and method for controlling execution of a program. An example method includes determining a memory sector for storing at least a portion of execution instructions of the computer program in virtual memory address space; determining, in the virtual memory address space, one or more pages that contain code instructions and data associated with the memory sector; creating a duplicate of the virtual memory address space comprising the memory sector and the one or more pages; tagging the memory sector and the one or more pages in both the virtual memory address space and its duplicate; receiving a notification to transfer execution of the computer program between different memory sectors while executing instructions stored in either the virtual memory address space or its duplicate; and transferring execution of the computer program to a memory location other than the one in which the notification was received.
    Type: Application
    Filed: August 11, 2016
    Publication date: December 7, 2017
    Inventors: Vladislav V. Pintiysky, Denis V. Anikin, Dmitry A. Kirsanov
  • Patent number: 9740864
    Abstract: Disclosed are systems, methods, and computer program products for emulation of files using multiple images of the emulator state. In one example, the method includes loading the file into an emulator of the computer system; initiating emulation of the file by the emulator; storing an initial image of an initial state of the emulator; continuing the emulation of the file and detecting occurrence of a condition that results during the emulation of the file; creating and storing a new image of a next state of the emulator when an occurrence of the condition is detected; determining whether the emulation of the file has terminated correctly or incorrectly; and upon determining that the emulation of the file has terminated incorrectly, loading the new image of the next state into the emulator and resuming the emulation of the file from the next state of the emulator.
    Type: Grant
    Filed: June 24, 2015
    Date of Patent: August 22, 2017
    Assignee: AO Kaspersky Lab
    Inventors: Vladislav V. Pintiysky, Sergey Y. Belov
  • Patent number: 9679139
    Abstract: A method and system are provided for performing an antivirus scan of a file on a virtual machine. An example method includes performing a first execution of the file on the virtual machine, recording a first log that includes an API function call and an internal event detected during execution, and determining if any signatures in the log are stored in a signatures database. Moreover, if no signatures in the first log are found in the first database of signatures, the file is classified as not malicious. In contrast, if at least one signature is found, a second execution of the file is perform and a second log is recorded that includes a detected internal event. Moreover, the method includes determining if any signatures in the second log are stored in a second database of signatures; and classifying the file as not malicious if no signatures are found.
    Type: Grant
    Filed: May 31, 2016
    Date of Patent: June 13, 2017
    Assignee: AO Kaspersky Lab
    Inventors: Alexey V. Monastyrsky, Vitaly V. Butuzov, Maxim Y. Golovkin, Dmitry V. Karasovsky, Vladislav V. Pintiysky, Denis Y. Kobychev
  • Publication number: 20170091457
    Abstract: Systems and methods to detect malicious executable files having a script language interpreter by combining a script emulator and a machine code emulator. A system includes an analyzer configured to convert a script into pseudocode and monitor an emulation process of the pseudocode, a script emulator configured to sequentially emulate the pseudocode and write emulation results to an emulator operation log, and a machine code emulator configured to emulate the pseudocode if a transition from pseudocode to machine code is detected by the analyzer, such that the analyzer can analyze the emulator operation log to determine if the executable file is malicious.
    Type: Application
    Filed: November 8, 2016
    Publication date: March 30, 2017
    Inventors: Vyacheslav V. Zakorzhevsky, Dmitry V. Vinogradov, Vladislav V. Pintiysky, Dmitry A. Kirsanov
  • Patent number: 9501643
    Abstract: Systems and methods to detect malicious executable files having a script language interpreter by combining a script emulator and a machine code emulator. A system includes an analyzer configured to convert a script into pseudocode and monitor an emulation process of the pseudocode, a script emulator configured to sequentially emulate the pseudocode and write emulation results to an emulator operation log, and a machine code emulator configured to emulate the pseudocode if a transition from pseudocode to machine code is detected by the analyzer, such that the analyzer can analyze the emulator operation log to determine if the executable file is malicious.
    Type: Grant
    Filed: February 4, 2016
    Date of Patent: November 22, 2016
    Assignee: AO KASPERSKY LAB
    Inventors: Vyacheslav V. Zakorzhevsky, Dmitry V. Vinogradov, Vladislav V. Pintiysky, Dmitry A. Kirsanov
  • Publication number: 20150294112
    Abstract: Disclosed are systems, methods, and computer program products for emulation of files using multiple images of the emulator state. In one example, the method includes loading the file into an emulator of the computer system; initiating emulation of the file by the emulator; storing an initial image of an initial state of the emulator; continuing the emulation of the file and detecting occurrence of a condition that results during the emulation of the file; creating and storing a new image of a next state of the emulator when an occurrence of the condition is detected; determining whether the emulation of the file has terminated correctly or incorrectly; and upon determining that the emulation of the file has terminated incorrectly, loading the new image of the next state into the emulator and resuming the emulation of the file from the next state of the emulator.
    Type: Application
    Filed: June 24, 2015
    Publication date: October 15, 2015
    Inventors: Vladislav V. Pintiysky, Sergey Y. Belov
  • Patent number: 9116621
    Abstract: Disclosed are system and method for controlling execution of a program. An example method includes determining a memory sector of interest in a first virtual memory location; duplicating the memory sector of interest in a second virtual memory location; tagging the memory sector of interest in the first virtual address space and the duplicated memory sector in the second virtual address space with different tags; selecting between the memory sector of interest and the duplicated memory sector a memory location for execution of the program; executing, by a hardware processor, the program in the selected memory location until receipt of a notification to transfer execution of the program from a memory sector tagged with one tag to a memory sector tagged with a different tag; and transferring program execution to the memory location other than the one in which the notification was received.
    Type: Grant
    Filed: January 14, 2015
    Date of Patent: August 25, 2015
    Assignee: Kaspersky Lab ZAO
    Inventors: Vladislav V. Pintiysky, Dmitry A. Kirsanov, Denis V. Anikin
  • Patent number: 9111096
    Abstract: Disclosed are systems, methods, and computer program products for preserving and subsequently restoring a state of a program emulator. In one aspect, the system loads a file into an emulator of the computer system and determines whether an emulation is being performed for the first time. When the emulation is performed for the first time, the system loads into the emulator an initial image of the emulator state and emulates the file using the loaded initial image of the emulator state. During emulation, the system creates and stores new images of the emulator state upon occurrence of predefined conditions. When the emulation is not performed for the first time, the system identifies new images of the emulator state created during initial emulation of the file, loads into the emulator the identified images, and resume emulating the file using the new images of the emulator state.
    Type: Grant
    Filed: March 21, 2014
    Date of Patent: August 18, 2015
    Assignee: AO Kaspersky Lab
    Inventors: Vladislav V. Pintiysky, Sergey Y. Belov
  • Publication number: 20150121531
    Abstract: Disclosed are systems, methods, and computer program products for preserving and subsequently restoring a state of a program emulator. In one aspect, the system loads a file into an emulator of the computer system and determines whether an emulation is being performed for the first time. When the emulation is performed for the first time, the system loads into the emulator an initial image of the emulator state and emulates the file using the loaded initial image of the emulator state. During emulation, the system creates and stores new images of the emulator state upon occurrence of predefined conditions. When the emulation is not performed for the first time, the system identifies new images of the emulator state created during initial emulation of the file, loads into the emulator the identified images, and resume emulating the file using the new images of the emulator state.
    Type: Application
    Filed: March 21, 2014
    Publication date: April 30, 2015
    Applicant: Kaspersky Lab ZAO
    Inventors: Vladislav V. Pintiysky, Sergey Y. Belov
  • Patent number: 8365297
    Abstract: System and method for detecting malware on a target computer system having a bootable device. Boot process information stored on the bootable device that at least partially defines a boot process of the target computer system is obtained, along with physical parameter data defining a storage arrangement structure of the bootable device. The boot process of the target computer system is emulated based on the boot process information and on the physical parameter data. The emulation includes executing instructions of the boot process information and tracking data accessed from the bootable device. A data structure representing the data accessed from the bootable device is stored during the emulation of the boot process. The data structure can be analyzed for any presence of boot process malware.
    Type: Grant
    Filed: April 5, 2012
    Date of Patent: January 29, 2013
    Assignee: Kaspersky Lab ZAO
    Inventors: Yury G. Parshin, Vladislav V. Pintiysky