Publication:
Analysis of the control flow graph to detect attacks at the application by verification its system calls

dc.contributor.authorParinov, M. A.
dc.contributor.authorSirotkina, A. G.
dc.date.accessioned2024-11-26T12:59:15Z
dc.date.available2024-11-26T12:59:15Z
dc.date.issued2020
dc.description.abstract© 2020 SERSC.Modern applications are often subjected to various attacks. The problem of identifying buffer overflow attacks on applications has been and remains one of the urgent tasks of information security. The aim of this work is to develop an algorithm for detecting attacks on an application by checking its system calls. Seeing this, existing approaches to detecting a buffer overflow attack are analyzed. Given their shortcomings, an algorithm is proposed for detecting attacks on the application by checking the system calls it makes. Such an application protection method involves detecting attacks that lead to code injections, that is, to changes in the software control flow. To build this algorithm, the control flow graph and the process of making a system call were analyzed. Based on the obtained data, an algorithm for constructing the behavior model of the software with vulnurability is proposed, in which, when passing through each of the control graph vertices, the system call made by the function is extracted and recorded in a special structure that will be used to protect the analyzed application. This approach allows you to protect a system with potentially vulnerable software from code injection attacks.
dc.format.extentС. 1483-1491
dc.identifier.citationParinov, M. A. Analysis of the control flow graph to detect attacks at the application by verification its system calls / Parinov, M.A., Sirotkina, A.G. // International Journal of Advanced Science and Technology. - 2020. - 29. - № 9 Special Issue. - P. 1483-1491
dc.identifier.urihttps://www.scopus.com/record/display.uri?eid=2-s2.0-85084475610&origin=resultslist
dc.identifier.urihttps://openrepository.mephi.ru/handle/123456789/21684
dc.relation.ispartofInternational Journal of Advanced Science and Technology
dc.titleAnalysis of the control flow graph to detect attacks at the application by verification its system calls
dc.typeArticle
dspace.entity.typePublication
oaire.citation.issue9 Special Issue
oaire.citation.volume29
relation.isOrgUnitOfPublication010157d0-1f75-46b2-ab5b-712e3424b4f5
relation.isOrgUnitOfPublication3d683db7-9a7b-4e1e-8011-ff80d8ac7d34
relation.isOrgUnitOfPublication.latestForDiscovery010157d0-1f75-46b2-ab5b-712e3424b4f5
Файлы
Коллекции