Zobrazeno 1 - 10
of 16
pro vyhledávání: '"Pavel Dovgalyuk"'
Autor:
Pavel Dovgalyuk, Vladimir Makarov
Publikováno v:
Труды Института системного программирования РАН, Vol 28, Iss 5, Pp 55-72 (2018)
The majority of software vulnerabilities originate from buffer overflow. Techniques to eliminate buffer overflows and limit their damage include secure programming, source code audit, binary code audit, static and dynamic code generation features. Mo
Externí odkaz:
https://doaj.org/article/0e584b418ab142058c34cb89335d0636
Publikováno v:
Proceedings of the XXth Conference of Open Innovations Association FRUCT, Vol 664, Iss 18, Pp 41-47 (2016)
Prototyping and debugging of operating systems and drivers are very tough tasks because of hardware volatility, kernel panics, blue screens of death, long periods of time required to expose the bug, perturbation of the drivers by the debugger, and no
Externí odkaz:
https://doaj.org/article/64aad414248b4e8eb2ce7c5e34998c86
Autor:
Pavel Dovgalyuk
Publikováno v:
Труды Института системного программирования РАН, Vol 21, Iss 0 (2018)
The paper describes a technology that allows to capture and rerun scripts of program execution within a virtual machine. This technology enables to debug programs deterministically and may be use in future for implementation of different mechanisms o
Externí odkaz:
https://doaj.org/article/1e29be677b2947a7b0b39230d4cd9fec
Publikováno v:
2021 IEEE 21st International Conference on Software Quality, Reliability and Security Companion (QRS-C).
Autor:
Natalia Fursova, Ivan Vasiliev, Vladimir Makarov, Pavel Dovgalyuk, Mikhail Abakumov, Denis Dmitriev
Publikováno v:
QRS
This paper presents SWAT — System-Wide Analysis Toolkit. It is based on open source emulation and debugging projects and implements the approaches for non-intrusive system-wide analysis and debugging: lightweight OS-agnostic virtual machine introsp
Publikováno v:
Proceedings of the XXth Conference of Open Innovations Association FRUCT, Vol 664, Iss 18, Pp 41-47 (2016)
FRUCT
FRUCT
Prototyping and debugging of operating systems and drivers are very tough tasks because of hardware volatility, kernel panics, blue screens of death, long periods of time required to expose the bug, perturbation of the drivers by the debugger, and no
Autor:
Pavel Dovgalyuk, Vladimir Makarov
Publikováno v:
Труды Института системного программирования РАН, Vol 28, Iss 5, Pp 55-72 (2018)
The majority of software vulnerabilities originate from buffer overflow. Techniques to eliminate buffer overflows and limit their damage include secure programming, source code audit, binary code audit, static and dynamic code generation features. Mo
Publikováno v:
2018 International Conference on Embedded Software (EMSOFT).
This paper presents a novel approach for virtual machine introspection of the embedded systems based on the unknown revisions of the known kernels. Existing introspection methods require embedding the code into the guest to capture the data for analy
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783319743127
Ershov Informatics Conference
Ershov Informatics Conference
Dynamic analysis is an important technology for different phases of the software life cycle. Dynamic analysis is used for profiling, malware analysis, intrusion detection, protocol reverse engineering, software testing, and many other activities. Thi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ef6287052d21e10c7145f7ef58c6e3af
https://doi.org/10.1007/978-3-319-74313-4_11
https://doi.org/10.1007/978-3-319-74313-4_11
Publikováno v:
ESEC/SIGSOFT FSE
This paper presents the framework based on the emulator QEMU. Our framework provides set of multi-platform analysis tools for the virtual machines and mechanism for creating instrumentation and analysis tools. Our framework is based on a lightweight