نمایش مختصر رکورد

dc.contributor.authorLetychevskyi, Oleksandren_US
dc.contributor.authorHryniuk, Yaroslaven_US
dc.contributor.authorYakovlev, Viktoren_US
dc.contributor.authorPeschanenko, Volodymyren_US
dc.contributor.authorRadchenko, Viktoren_US
dc.date.accessioned1399-07-08T19:45:02Zfa_IR
dc.date.accessioned2020-09-29T19:45:02Z
dc.date.available1399-07-08T19:45:02Zfa_IR
dc.date.available2020-09-29T19:45:02Z
dc.date.issued2019-08-01en_US
dc.date.issued1398-05-10fa_IR
dc.date.submitted2019-07-09en_US
dc.date.submitted1398-04-18fa_IR
dc.identifier.citationLetychevskyi, Oleksandr, Hryniuk, Yaroslav, Yakovlev, Viktor, Peschanenko, Volodymyr, Radchenko, Viktor. (2019). Algebraic Matching of Vulnerabilities in a Low-Level Code. The ISC International Journal of Information Security, 11(3), 1-7. doi: 10.22042/isecure.2019.11.0.1en_US
dc.identifier.issn2008-2045
dc.identifier.issn2008-3076
dc.identifier.urihttps://dx.doi.org/10.22042/isecure.2019.11.0.1
dc.identifier.urihttp://www.isecure-journal.com/article_90271.html
dc.identifier.urihttps://iranjournals.nlai.ir/handle/123456789/73439
dc.description.abstractThis paper explores the algebraic matching approach for detection of vulnerabilities in binary codes. The algebraic programming system is used for implementing this method. It is anticipated that models of vulnerabilities and programs to be verified are presented as behavior algebra and action language specifications. The methods of algebraic matching are based on rewriting rules and techniques with usage of conditional rewriting. This process is combined with symbolic modeling that gives a possibility to provide accurate detection of vulnerabilities. The paper provides examples of formalization of vulnerability models and translation of binary codes to behavior algebra expressions.en_US
dc.format.extent2450
dc.format.mimetypeapplication/pdf
dc.languageEnglish
dc.language.isoen_US
dc.publisherIranian Society of Cryptologyen_US
dc.relation.ispartofThe ISC International Journal of Information Securityen_US
dc.relation.isversionofhttps://dx.doi.org/10.22042/isecure.2019.11.0.1
dc.subjectAlgebraic Matchingen_US
dc.subjectSymbolic Modelingen_US
dc.subjectBehavior Algebraen_US
dc.subjectRewriting Rulesen_US
dc.subjectVulnerability Detectionen_US
dc.titleAlgebraic Matching of Vulnerabilities in a Low-Level Codeen_US
dc.typeTexten_US
dc.typeORIGINAL RESEARCH PAPERen_US
dc.contributor.departmentGlushkov Institute of Cybernetics of National Academy of Sciences of Ukraine 40, Glushkova prospect, Kyiv, Ukraineen_US
dc.contributor.departmentGlushkov Institute of Cybernetics of National Academy of Sciences of Ukraine 40, Glushkova prospect, Kyiv, Ukraineen_US
dc.contributor.departmentGlushkov Institute of Cybernetics of National Academy of Sciences of Ukraine 40, Glushkova prospect, Kyiv, Ukraineen_US
dc.contributor.departmentGaruda AI B.V., 54-62, Beachavenu, Schiphol-Rijk, Netherlandsen_US
dc.contributor.departmentGaruda AI B.V., 54-62, Beachavenu, Schiphol-Rijk, Netherlandsen_US
dc.citation.volume11
dc.citation.issue3
dc.citation.spage1
dc.citation.epage7


فایل‌های این مورد

Thumbnail

این مورد در مجموعه‌های زیر وجود دارد:

نمایش مختصر رکورد