Corrigendum to: Y. V. Kosolapov, “On the Detection of Exploitation of Vulnerabilities Leading to the Execution of a Malicious Code”, Modeling and analysis of information systems, vol. 27, no. 2, pp. 138–151, 2020. DOI: https://doi.org/10.18255/1818-1015-2020-2-138-151

In the article by Y. V. Kosolapov “On the Detection of Exploitation of Vulnerabilities Leading to the Execution of a Malicious Code” (Modeling and analysis of information systems, vol. 27, no. 2, pp. 138–151, 2020; https://doi.org/10.18255/1818-1015-2020-2-138-151) an inaccurate description of the a...

Full description

Bibliographic Details
Main Author: Yury V. Kosolapov
Format: Article
Language:English
Published: Yaroslavl State University 2021-10-01
Series:Моделирование и анализ информационных систем
Subjects:
Online Access:https://www.mais-journal.ru/jour/article/view/1531
_version_ 1826558894710718464
author Yury V. Kosolapov
author_facet Yury V. Kosolapov
author_sort Yury V. Kosolapov
collection DOAJ
description In the article by Y. V. Kosolapov “On the Detection of Exploitation of Vulnerabilities Leading to the Execution of a Malicious Code” (Modeling and analysis of information systems, vol. 27, no. 2, pp. 138–151, 2020; https://doi.org/10.18255/1818-1015-2020-2-138-151) an inaccurate description of the algorithm CheckTrace is committed. The correct description of the algorithm CheckTrace is given below. The author apologises for the inconvenience.
first_indexed 2024-04-10T02:23:57Z
format Article
id doaj.art-3b23e102b80446d1baa0d0bb63580830
institution Directory Open Access Journal
issn 1818-1015
2313-5417
language English
last_indexed 2025-03-14T08:51:45Z
publishDate 2021-10-01
publisher Yaroslavl State University
record_format Article
series Моделирование и анализ информационных систем
spelling doaj.art-3b23e102b80446d1baa0d0bb635808302025-03-02T12:46:59ZengYaroslavl State UniversityМоделирование и анализ информационных систем1818-10152313-54172021-10-0128331431610.18255/1818-1015-2021-3-314-3161166Corrigendum to: Y. V. Kosolapov, “On the Detection of Exploitation of Vulnerabilities Leading to the Execution of a Malicious Code”, Modeling and analysis of information systems, vol. 27, no. 2, pp. 138–151, 2020. DOI: https://doi.org/10.18255/1818-1015-2020-2-138-151Yury V. Kosolapov0Southern Federal UniversityIn the article by Y. V. Kosolapov “On the Detection of Exploitation of Vulnerabilities Leading to the Execution of a Malicious Code” (Modeling and analysis of information systems, vol. 27, no. 2, pp. 138–151, 2020; https://doi.org/10.18255/1818-1015-2020-2-138-151) an inaccurate description of the algorithm CheckTrace is committed. The correct description of the algorithm CheckTrace is given below. The author apologises for the inconvenience.https://www.mais-journal.ru/jour/article/view/1531system callslibrary callssoftware vulnerability
spellingShingle Yury V. Kosolapov
Corrigendum to: Y. V. Kosolapov, “On the Detection of Exploitation of Vulnerabilities Leading to the Execution of a Malicious Code”, Modeling and analysis of information systems, vol. 27, no. 2, pp. 138–151, 2020. DOI: https://doi.org/10.18255/1818-1015-2020-2-138-151
Моделирование и анализ информационных систем
system calls
library calls
software vulnerability
title Corrigendum to: Y. V. Kosolapov, “On the Detection of Exploitation of Vulnerabilities Leading to the Execution of a Malicious Code”, Modeling and analysis of information systems, vol. 27, no. 2, pp. 138–151, 2020. DOI: https://doi.org/10.18255/1818-1015-2020-2-138-151
title_full Corrigendum to: Y. V. Kosolapov, “On the Detection of Exploitation of Vulnerabilities Leading to the Execution of a Malicious Code”, Modeling and analysis of information systems, vol. 27, no. 2, pp. 138–151, 2020. DOI: https://doi.org/10.18255/1818-1015-2020-2-138-151
title_fullStr Corrigendum to: Y. V. Kosolapov, “On the Detection of Exploitation of Vulnerabilities Leading to the Execution of a Malicious Code”, Modeling and analysis of information systems, vol. 27, no. 2, pp. 138–151, 2020. DOI: https://doi.org/10.18255/1818-1015-2020-2-138-151
title_full_unstemmed Corrigendum to: Y. V. Kosolapov, “On the Detection of Exploitation of Vulnerabilities Leading to the Execution of a Malicious Code”, Modeling and analysis of information systems, vol. 27, no. 2, pp. 138–151, 2020. DOI: https://doi.org/10.18255/1818-1015-2020-2-138-151
title_short Corrigendum to: Y. V. Kosolapov, “On the Detection of Exploitation of Vulnerabilities Leading to the Execution of a Malicious Code”, Modeling and analysis of information systems, vol. 27, no. 2, pp. 138–151, 2020. DOI: https://doi.org/10.18255/1818-1015-2020-2-138-151
title_sort corrigendum to y v kosolapov on the detection of exploitation of vulnerabilities leading to the execution of a malicious code modeling and analysis of information systems vol 27 no 2 pp 138 151 2020 doi https doi org 10 18255 1818 1015 2020 2 138 151
topic system calls
library calls
software vulnerability
url https://www.mais-journal.ru/jour/article/view/1531
work_keys_str_mv AT yuryvkosolapov corrigendumtoyvkosolapovonthedetectionofexploitationofvulnerabilitiesleadingtotheexecutionofamaliciouscodemodelingandanalysisofinformationsystemsvol27no2pp1381512020doihttpsdoiorg10182551818101520202138151