Search Results - "Kosolapov, Y. V."

  • Showing 1 - 8 results of 8
Refine Results
  1. 1

    On the Detection of Exploitation of Vulnerabilities That Leads to the Execution of a Malicious Code by Kosolapov, Y. V.

    Published in Automatic control and computer sciences (01-12-2021)
    “…Software protection from exploitation of possible unknown vulnerabilities can be ensured both by searching for (for example, using symbolic execution) and…”
    Get full text
    Journal Article
  2. 2

    Erratum to: On the Detection of Exploitation of Vulnerabilities That Leads to the Execution of a Malicious Code by Kosolapov, Y. V.

    “…An Erratum to this paper has been published: https://doi.org/10.3103/S0146411622070094…”
    Get full text
    Journal Article
  3. 3

    On Detecting Code Reuse Attacks by Kosolapov, Y. V.

    Published in Automatic control and computer sciences (01-12-2020)
    “…— Today, a code reuse technique is often used when exploiting software vulnerabilities, such as a buffer overflow. These attacks bypass the protection against…”
    Get full text
    Journal Article
  4. 4

    On the Characteristics of Symbolic Execution in the Problem of Assessing the Quality of Obfuscating Transformations by Borisov, P. D., Kosolapov, Y. V.

    Published in Automatic control and computer sciences (01-12-2022)
    “…Obfuscation is used to protect programs from analysis and reverse engineering. There are theoretically effective and resistant obfuscation methods, however,…”
    Get full text
    Journal Article
  5. 5

    On Building Self-Complementary Codes and Their Application in Information Hiding by Kosolapov, Y. V., Pevnev, F. S., Yagubyants, M. V.

    Published in Automatic control and computer sciences (01-12-2023)
    “…Line codes are widely used to protect data transmission and storage systems against errors, keep various cryptographic algorithms and protocols working stably,…”
    Get full text
    Journal Article
  6. 6

    Decoding the Tensor Product of MLD Codes and Applications for Code Cryptosystems by Deundyak, V. M., Kosolapov, Y. V., Lelyuk, E. A.

    Published in Automatic control and computer sciences (01-12-2018)
    “…For the practical application of code cryptosystems such as McEliece, the code used in the cryptosystem should have a fast decoding algorithm. On the other…”
    Get full text
    Journal Article
  7. 7

    Cryptosystem Based on Induced Group Codes by Deundyak, V. M., Kosolapov, Y. V.

    “…The code C on a group G, induced by the code N on a subgroup H, has the property that for decoding the code C one can use the decoder for the code N…”
    Get full text
    Journal Article
  8. 8

    Algorithms for Majority Decoding of Group Codes by Deundyak, V. M., Kosolapov, Y. V.

    “…We consider a problem of constructive description and justification of the algorithms necessary for a practical implementation of the majority decoder for group…”
    Get full text
    Journal Article