On the Detection of Exploitation of Vulnerabilities Leading to the Execution of a Malicious Code

Software protection from exploitation of possible unknown vulnerabilities can be performed both by searching (for example, using symbolic execution) and subsequent elimination of the vulnerabilities and by using detection and / or intrusion prevention systems. In the latter case, this problem is usu...

Full description

Bibliographic Details
Main Author: Yury V. Kosolapov
Format: Article
Language:English
Published: Yaroslavl State University 2020-06-01
Series:Моделирование и анализ информационных систем
Subjects:
Online Access:https://www.mais-journal.ru/jour/article/view/1321