The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Feb. 21, 2023

Filed:

Jul. 06, 2022
Applicant:

Acronis International Gmbh, Schaffhausen, CH;

Inventors:

Vladimir Strogov, Moscow, RU;

Serguei Beloussov, Costa del Sol, SG;

Alexey Dod, Moscow, RU;

Valery Chernyakovsky, Moscow, RU;

Anatoly Stupak, Moscow, RU;

Sergey Ulasen, Moscow, RU;

Nikolay Grebennikov, Moscow, RU;

Vyacheslav Levchenko, Moscow, RU;

Stanislav Protasov, Moscow, RU;

Assignee:

Acronis International GmbH, Schaffhausen, CH;

Attorneys:
Primary Examiner:
Int. Cl.
CPC ...
G06F 21/56 (2013.01); G06F 21/52 (2013.01); G06N 20/00 (2019.01);
U.S. Cl.
CPC ...
G06F 21/566 (2013.01); G06F 21/52 (2013.01); G06F 21/568 (2013.01); G06N 20/00 (2019.01); G06F 2221/033 (2013.01);
Abstract

Disclosed are systems and methods for detecting malicious applications. An exemplary method may comprise detecting that a first process has been launched on a computing device. The method may comprise receiving, from the first process, an execution stack associated with one or more control points of the first process. The method may comprise applying a machine learning classifier on the execution stack, wherein the machine learning classifier is configured to classify whether a process is malicious based on activity on control points captured on a given execution stack, and wherein a feature of a malicious process is detection of a system call to create a remote thread that runs in a virtual address space of a shared-service process configured to import third-party processes to be embedded as separate threads. The method may comprise generating an indication that the execution of the first process is malicious/non-malicious.


Find Patent Forward Citations

Loading…