Search Results - "Kosolapov, Y. V."
-
1
On the Detection of Exploitation of Vulnerabilities That Leads to the Execution of a Malicious Code
Published in Automatic control and computer sciences (01-12-2021)“…Software protection from exploitation of possible unknown vulnerabilities can be ensured both by searching for (for example, using symbolic execution) and…”
Get full text
Journal Article -
2
Erratum to: On the Detection of Exploitation of Vulnerabilities That Leads to the Execution of a Malicious Code
Published in Automatic control and computer sciences (2022)“…An Erratum to this paper has been published: https://doi.org/10.3103/S0146411622070094…”
Get full text
Journal Article -
3
On Detecting Code Reuse Attacks
Published in Automatic control and computer sciences (01-12-2020)“…— Today, a code reuse technique is often used when exploiting software vulnerabilities, such as a buffer overflow. These attacks bypass the protection against…”
Get full text
Journal Article -
4
On the Characteristics of Symbolic Execution in the Problem of Assessing the Quality of Obfuscating Transformations
Published in Automatic control and computer sciences (01-12-2022)“…Obfuscation is used to protect programs from analysis and reverse engineering. There are theoretically effective and resistant obfuscation methods, however,…”
Get full text
Journal Article -
5
On Building Self-Complementary Codes and Their Application in Information Hiding
Published in Automatic control and computer sciences (01-12-2023)“…Line codes are widely used to protect data transmission and storage systems against errors, keep various cryptographic algorithms and protocols working stably,…”
Get full text
Journal Article -
6
Decoding the Tensor Product of MLD Codes and Applications for Code Cryptosystems
Published in Automatic control and computer sciences (01-12-2018)“…For the practical application of code cryptosystems such as McEliece, the code used in the cryptosystem should have a fast decoding algorithm. On the other…”
Get full text
Journal Article -
7
Cryptosystem Based on Induced Group Codes
Published in Modelirovanie i analiz informacionnyh sistem (20-04-2016)“…The code C on a group G, induced by the code N on a subgroup H, has the property that for decoding the code C one can use the decoder for the code N…”
Get full text
Journal Article -
8
Algorithms for Majority Decoding of Group Codes
Published in Modelirovanie i analiz informacionnyh sistem (15-10-2015)“…We consider a problem of constructive description and justification of the algorithms necessary for a practical implementation of the majority decoder for group…”
Get full text
Journal Article