首页 > 最新文献

AUTOMATIC CONTROL AND COMPUTER SCIENCES最新文献

英文 中文
Early Detection of Network Attacks Based on Weight-Insensitive Neural Networks 基于权重不敏感神经网络的网络攻击早期检测
IF 0.6 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2024-02-29 DOI: 10.3103/S014641162308014X
D. S. Lavrova, O. A. Izotova

In this paper, we describe an approach for the early detection of network attacks using weight-insensitive neural networks (or weight agnostic neural networks (WANNs). The selection of the type of neural networks is determined by the specifics of their architecture, which provides high data-processing speed and performance, which is significant when solving the problem of the early detection of attacks. The experimental studies demonstrate the effectiveness of the proposed approach, which is based on a combination of multiple regression for selecting features of the training set and WANNs. The accuracy of attack recognition is comparable to the best results in this field with a significant gain in time.

摘要 本文介绍了一种利用权重不敏感神经网络(或称权重不可知神经网络(WANN))对网络攻击进行早期检测的方法。神经网络类型的选择取决于其体系结构的特殊性,它能提供较高的数据处理速度和性能,这对解决攻击的早期检测问题具有重要意义。实验研究证明了所提出的方法的有效性,该方法是基于选择训练集特征的多元回归和 WANNs 的组合。攻击识别的准确率可与该领域的最佳结果相媲美,而且在时间上有显著提高。
{"title":"Early Detection of Network Attacks Based on Weight-Insensitive Neural Networks","authors":"D. S. Lavrova,&nbsp;O. A. Izotova","doi":"10.3103/S014641162308014X","DOIUrl":"10.3103/S014641162308014X","url":null,"abstract":"<p>In this paper, we describe an approach for the early detection of network attacks using weight-insensitive neural networks (or weight agnostic neural networks (WANNs). The selection of the type of neural networks is determined by the specifics of their architecture, which provides high data-processing speed and performance, which is significant when solving the problem of the early detection of attacks. The experimental studies demonstrate the effectiveness of the proposed approach, which is based on a combination of multiple regression for selecting features of the training set and WANNs. The accuracy of attack recognition is comparable to the best results in this field with a significant gain in time.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"57 8","pages":"1047 - 1054"},"PeriodicalIF":0.6,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140888809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Searching for Software Vulnerabilities Using an Ensemble of Algorithms for the Analysis of a Graph Representation of the Code 利用分析代码图表示的算法组合搜索软件漏洞
IF 0.6 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2024-02-29 DOI: 10.3103/S0146411623080126
G. S. Kubrin, D. P. Zegzhda

This article analyzes the existing methods for searching for software vulnerabilities. For methods using deep learning models on a graph representation of the code, the problem of imaginary relationships between procedures is formulated, which complicates their application to code analysis problems. To solve the formulated problem, an iterative method is proposed based on an ensemble of algorithms for analyzing the graph representation of the code. The method relies on a step-by-step narrowing of the set of code sections under consideration to increase the efficiency of using highly computationally complex methods. For the proposed method, a prototype of a system for searching for vulnerabilities for programs based on the .NET platform is presented, tested on a sample of NIST SARD and software with a large amount of code.

摘要 本文分析了现有的软件漏洞搜索方法。对于在代码的图表示上使用深度学习模型的方法,提出了程序之间的想象关系问题,这使其在代码分析问题上的应用变得复杂。为了解决这个问题,我们提出了一种迭代方法,该方法基于分析代码图表示的算法集合。该方法依赖于逐步缩小所考虑的代码部分的范围,以提高使用计算复杂度高的方法的效率。针对所提出的方法,介绍了基于 .NET 平台的程序漏洞搜索系统原型,并在 NIST SARD 和具有大量代码的软件样本上进行了测试。
{"title":"Searching for Software Vulnerabilities Using an Ensemble of Algorithms for the Analysis of a Graph Representation of the Code","authors":"G. S. Kubrin,&nbsp;D. P. Zegzhda","doi":"10.3103/S0146411623080126","DOIUrl":"10.3103/S0146411623080126","url":null,"abstract":"<p>This article analyzes the existing methods for searching for software vulnerabilities. For methods using deep learning models on a graph representation of the code, the problem of imaginary relationships between procedures is formulated, which complicates their application to code analysis problems. To solve the formulated problem, an iterative method is proposed based on an ensemble of algorithms for analyzing the graph representation of the code. The method relies on a step-by-step narrowing of the set of code sections under consideration to increase the efficiency of using highly computationally complex methods. For the proposed method, a prototype of a system for searching for vulnerabilities for programs based on the .NET platform is presented, tested on a sample of NIST SARD and software with a large amount of code.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"57 8","pages":"947 - 957"},"PeriodicalIF":0.6,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140888890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Framework for Modeling Security Policies of Big Data Processing Systems 大数据处理系统安全策略建模框架
IF 0.6 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2024-02-29 DOI: 10.3103/S0146411623080254
M. A. Poltavtseva, D. V. Ivanov, E. V. Zavadskii

This paper studies automatizing the analysis of access control in big data management systems by modeling security policies. It analyzes modern methods of ensuring access control in this class of systems, determines the respective requirements, and chooses the most advanced method for describing security policies as part of the solution in development. The task of modeling security policies in big data management systems is formulated. The architecture, the main components, and the general operating algorithm of the software framework for solving the task, as well as the experimental validation results, are presented. The strengths and weaknesses of the framework are assessed and ways for its further upgrade suggested.

摘要 本文研究通过安全策略建模实现大数据管理系统访问控制分析的自动化。它分析了确保该类系统访问控制的现代方法,确定了相应的要求,并选择了最先进的方法来描述安全策略,作为正在开发的解决方案的一部分。制定了大数据管理系统中安全策略建模的任务。介绍了解决该任务的软件框架的架构、主要组件和一般操作算法,以及实验验证结果。评估了该框架的优缺点,并提出了进一步升级的方法。
{"title":"Framework for Modeling Security Policies of Big Data Processing Systems","authors":"M. A. Poltavtseva,&nbsp;D. V. Ivanov,&nbsp;E. V. Zavadskii","doi":"10.3103/S0146411623080254","DOIUrl":"10.3103/S0146411623080254","url":null,"abstract":"<p>This paper studies automatizing the analysis of access control in big data management systems by modeling security policies. It analyzes modern methods of ensuring access control in this class of systems, determines the respective requirements, and chooses the most advanced method for describing security policies as part of the solution in development. The task of modeling security policies in big data management systems is formulated. The architecture, the main components, and the general operating algorithm of the software framework for solving the task, as well as the experimental validation results, are presented. The strengths and weaknesses of the framework are assessed and ways for its further upgrade suggested.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"57 8","pages":"1063 - 1070"},"PeriodicalIF":0.6,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140889680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Methodological Approach to Construct Models for Predicting Indicators of Properties of Information Security Systems 构建信息安全系统属性指标预测模型的方法论
IF 0.6 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2024-02-29 DOI: 10.3103/S0146411623080357
D. P. Zegzhda, A. F. Suprun, V. G. Anisimov, A. V. Tebekin, E. G. Anisimov

A methodological approach to construct models for predicting indicators of properties of information security systems at evolutionary stages of development is proposed. The approach is based on the idea of the development of information security systems as a process of change in the acceptable range of indicators characterizing their properties. It is assumed that the number of resources spent on improving each property is greater the closer the current value of the indicator characterizing this property is to the maximum possible value for the information security system under consideration. This circumstance is taken into account by reducing the relative rates of improvement in indicators as their values approach the maximum possible value.

摘要 提出了一种构建模型的方法,用于预测处于发展演变阶段的信息安全系统的属性指标。该方法基于信息安全系统的发展是其特性指标可接受范围的变化过程这一理念。假定表征每个属性的指标的当前值越接近所考虑的信息安全系统的最大可能值,用于改进每个属性的资源数量就越多。考虑到这一情况,在指标值接近最大可能值时,降低指标的相对改进率。
{"title":"Methodological Approach to Construct Models for Predicting Indicators of Properties of Information Security Systems","authors":"D. P. Zegzhda,&nbsp;A. F. Suprun,&nbsp;V. G. Anisimov,&nbsp;A. V. Tebekin,&nbsp;E. G. Anisimov","doi":"10.3103/S0146411623080357","DOIUrl":"10.3103/S0146411623080357","url":null,"abstract":"<p>A methodological approach to construct models for predicting indicators of properties of information security systems at evolutionary stages of development is proposed. The approach is based on the idea of the development of information security systems as a process of change in the acceptable range of indicators characterizing their properties. It is assumed that the number of resources spent on improving each property is greater the closer the current value of the indicator characterizing this property is to the maximum possible value for the information security system under consideration. This circumstance is taken into account by reducing the relative rates of improvement in indicators as their values approach the maximum possible value.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"57 8","pages":"881 - 885"},"PeriodicalIF":0.6,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140001809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid Method for the Detection of Evasion Attacks Aimed at Machine Learning Systems 检测针对机器学习系统的规避攻击的混合方法
IF 0.6 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2024-02-29 DOI: 10.3103/S0146411623080072
M. O. Kalinin, A. F. Suprun, O. D. Ivanova

The existing methods for the detection of evasion attacks in machine learning systems are analyzed. An experimental comparison of the methods is carried out. The uncertainty method is universal; however, in this method, it is difficult to determine such uncertainty boundaries for adversarial examples that would enable the precise identification of evasion attacks, which would result in lower efficiency parameters with respect to the skip gradient method (SGM) attack, maps of significance (MS) attack, and boundary attack (BA) compared to the other methods. A new hybrid method representing the two-stage input data verification complemented with preliminary processing is developed. In the new method, the uncertainty boundary for adversarial objects has become distinguishable and quickly computable. The hybrid method makes it possible to detect out-of-distribution (OOD) evasion attacks with a precision of not less than 80%, and SGM, MS, and BA attacks with a precision of 93%.

摘要 分析了在机器学习系统中检测规避攻击的现有方法。对这些方法进行了实验比较。不确定性方法具有普遍性;但是,在这种方法中,很难确定对抗示例的不确定性边界,从而无法精确识别规避攻击,这将导致跳过梯度法(SGM)攻击、显著性映射(MS)攻击和边界攻击(BA)的效率参数低于其他方法。我们开发了一种新的混合方法,它代表了以初步处理为补充的两阶段输入数据验证。在新方法中,对抗对象的不确定性边界变得可区分且可快速计算。该混合方法能以不低于 80% 的精度检测出分布外(OOD)规避攻击,并能以 93% 的精度检测出 SGM、MS 和 BA 攻击。
{"title":"Hybrid Method for the Detection of Evasion Attacks Aimed at Machine Learning Systems","authors":"M. O. Kalinin,&nbsp;A. F. Suprun,&nbsp;O. D. Ivanova","doi":"10.3103/S0146411623080072","DOIUrl":"10.3103/S0146411623080072","url":null,"abstract":"<p>The existing methods for the detection of evasion attacks in machine learning systems are analyzed. An experimental comparison of the methods is carried out. The uncertainty method is universal; however, in this method, it is difficult to determine such uncertainty boundaries for adversarial examples that would enable the precise identification of evasion attacks, which would result in lower efficiency parameters with respect to the skip gradient method (SGM) attack, maps of significance (MS) attack, and boundary attack (BA) compared to the other methods. A new hybrid method representing the two-stage input data verification complemented with preliminary processing is developed. In the new method, the uncertainty boundary for adversarial objects has become distinguishable and quickly computable. The hybrid method makes it possible to detect out-of-distribution (OOD) evasion attacks with a precision of not less than 80%, and SGM, MS, and BA attacks with a precision of 93%.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"57 8","pages":"983 - 988"},"PeriodicalIF":0.6,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140001801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyberattack Detection in the Industrial Internet of Things Based on the Computation Model of Hierarchical Temporal Memory 基于分层时态记忆计算模型的工业物联网网络攻击检测
IF 0.6 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2024-02-29 DOI: 10.3103/S0146411623080114
V. M. Krundyshev, G. A. Markov, M. O. Kalinin, P. V. Semyanov, A. G. Busygin

This study considers the problem of detecting network anomalies caused by computer attacks in the networks of the industrial Internet of things. To detect anomalies, a new method is proposed, built using a hierarchical temporal memory (HTM) computation model based on the neocortex model. An experimental study of the developed method of detecting computer attacks based on the HTM model showed the superiority of the developed solution over the LSTM analog. The developed prototype of the anomaly detection system provides continuous training on unlabeled data sets in real time, takes into account the current network context, and applies the accumulated experience by supporting the memory mechanism.

摘要 本研究探讨了在工业物联网网络中检测计算机攻击导致的网络异常的问题。为了检测异常情况,本文提出了一种新方法,该方法采用基于新皮层模型的分层时间记忆(HTM)计算模型。对所开发的基于 HTM 模型的计算机攻击检测方法进行的实验研究表明,所开发的解决方案优于 LSTM 模拟方案。所开发的异常检测系统原型可在无标记数据集上实时提供持续训练,考虑当前网络环境,并通过支持记忆机制应用所积累的经验。
{"title":"Cyberattack Detection in the Industrial Internet of Things Based on the Computation Model of Hierarchical Temporal Memory","authors":"V. M. Krundyshev,&nbsp;G. A. Markov,&nbsp;M. O. Kalinin,&nbsp;P. V. Semyanov,&nbsp;A. G. Busygin","doi":"10.3103/S0146411623080114","DOIUrl":"10.3103/S0146411623080114","url":null,"abstract":"<p>This study considers the problem of detecting network anomalies caused by computer attacks in the networks of the industrial Internet of things. To detect anomalies, a new method is proposed, built using a hierarchical temporal memory (HTM) computation model based on the neocortex model. An experimental study of the developed method of detecting computer attacks based on the HTM model showed the superiority of the developed solution over the LSTM analog. The developed prototype of the anomaly detection system provides continuous training on unlabeled data sets in real time, takes into account the current network context, and applies the accumulated experience by supporting the memory mechanism.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"57 8","pages":"1040 - 1046"},"PeriodicalIF":0.6,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140888817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of Machine Learning Methods to the Problem of Searching for a Region of Interest for Biometric Identification Based on the Pattern of Palm Veins 将机器学习方法应用于基于手掌静脉模式的生物识别感兴趣区搜索问题
IF 0.6 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2024-02-29 DOI: 10.3103/S0146411623080023
A. I. Almuhamedov, V. S. Kolomoitcev

This paper discusses the problem of searching for a region of interest for biometric identification based on the pattern of palm veins. An image segmentation method is proposed based on the use of convolutional neural networks (CNNs) to search for a region of interest. The operation of this method is compared with methods that use the features of a binarized image, and in particular, with the method of searching for the local minima and searching for the minimum threshold value.

摘要 本文讨论了基于手掌静脉图案的生物特征识别中搜索感兴趣区域的问题。在使用卷积神经网络(CNN)搜索感兴趣区域的基础上,提出了一种图像分割方法。该方法的操作与使用二值化图像特征的方法进行了比较,特别是与搜索局部最小值和搜索最小阈值的方法进行了比较。
{"title":"Application of Machine Learning Methods to the Problem of Searching for a Region of Interest for Biometric Identification Based on the Pattern of Palm Veins","authors":"A. I. Almuhamedov,&nbsp;V. S. Kolomoitcev","doi":"10.3103/S0146411623080023","DOIUrl":"10.3103/S0146411623080023","url":null,"abstract":"<p>This paper discusses the problem of searching for a region of interest for biometric identification based on the pattern of palm veins. An image segmentation method is proposed based on the use of convolutional neural networks (CNNs) to search for a region of interest. The operation of this method is compared with methods that use the features of a binarized image, and in particular, with the method of searching for the local minima and searching for the minimum threshold value.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"57 8","pages":"1126 - 1134"},"PeriodicalIF":0.6,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140888821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Defense against Adversarial Attacks on Image Recognition Systems Using an Autoencoder 利用自动编码器防御对图像识别系统的恶意攻击
IF 0.6 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2024-02-29 DOI: 10.3103/S0146411623080230
V. V. Platonov, N. M. Grigorjeva

Adversarial attacks on artificial neural network systems for image recognition are considered. To improve the security of image recognition systems against adversarial attacks (evasion attacks), the use of autoencoders is proposed. Various attacks are considered and software prototypes of autoencoders of full-link and convolutional architectures are developed as means of defense against evasion attacks. The possibility of using developed prototypes as a basis for designing autoencoders more complex architectures is substantiated.

摘要 考虑了对用于图像识别的人工神经网络系统的对抗性攻击。为了提高图像识别系统抵御对抗性攻击(规避攻击)的安全性,提出了使用自动编码器的方法。研究考虑了各种攻击,并开发了全链路和卷积结构的自动编码器软件原型,作为抵御逃避攻击的手段。使用开发的原型作为设计更复杂架构的自动编码器的基础的可能性得到了证实。
{"title":"Defense against Adversarial Attacks on Image Recognition Systems Using an Autoencoder","authors":"V. V. Platonov,&nbsp;N. M. Grigorjeva","doi":"10.3103/S0146411623080230","DOIUrl":"10.3103/S0146411623080230","url":null,"abstract":"<p>Adversarial attacks on artificial neural network systems for image recognition are considered. To improve the security of image recognition systems against adversarial attacks (evasion attacks), the use of autoencoders is proposed. Various attacks are considered and software prototypes of autoencoders of full-link and convolutional architectures are developed as means of defense against evasion attacks. The possibility of using developed prototypes as a basis for designing autoencoders more complex architectures is substantiated.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"57 8","pages":"989 - 995"},"PeriodicalIF":0.6,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140888886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Finding Enumerators for Generalized (L, G)-Code 为广义(L,G)代码寻找枚举器
IF 0.6 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2024-02-29 DOI: 10.3103/S0146411623080187
I. K. Noskov, S. V. Bezzateev

The algorithm for finding the enumerators of degree 2 and higher for the generalized (LG)‑code is presented. This algorithm makes it possible to enhance the rate of finding enumerators as distinct from the exhaustive search algorithm. It can be used to construct a modern variant of the McEliece cryptosystem. The presented solution is based on using the representation of the Galois field element via the function containing the coefficients of a smaller field. In addition, the results of comparison of the modern McEliece cryptosystem constructed based on the Goppa codes and generalized (L, G)-codes are presented.

本文介绍了为广义(L,G)代码寻找度数为 2 及以上的枚举器的算法。与穷举搜索算法不同的是,这种算法可以提高枚举器的寻找率。它可用于构建麦克埃利斯密码系统的现代变体。所提出的解决方案基于通过包含较小字段系数的函数来表示伽罗瓦字段元素。此外,还介绍了基于 Goppa 码和广义 (L, G) 码构建的现代 McEliece 密码系统的比较结果。
{"title":"Finding Enumerators for Generalized (L, G)-Code","authors":"I. K. Noskov,&nbsp;S. V. Bezzateev","doi":"10.3103/S0146411623080187","DOIUrl":"10.3103/S0146411623080187","url":null,"abstract":"<p>The algorithm for finding the enumerators of degree 2 and higher for the generalized (<i>L</i>, <i>G</i>)‑code is presented. This algorithm makes it possible to enhance the rate of finding enumerators as distinct from the exhaustive search algorithm. It can be used to construct a modern variant of the McEliece cryptosystem. The presented solution is based on using the representation of the Galois field element via the function containing the coefficients of a smaller field. In addition, the results of comparison of the modern McEliece cryptosystem constructed based on the Goppa codes and generalized (<i>L</i>, <i>G</i>)-codes are presented.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"57 8","pages":"922 - 927"},"PeriodicalIF":0.6,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142414877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Decompiled Program Code Using Abstract Syntax Trees 使用抽象语法树分析反编译程序代码
IF 0.6 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2024-02-29 DOI: 10.3103/S0146411623080060
N. A. Gribkov, T. D. Ovasapyan, D. A. Moskvin

This article proposes a method for preprocessing fragments of binary program codes for subsequent detection of their similarity using machine learning methods. The method is based on the analysis of pseudocode obtained as a result of decompiling fragments of binary codes. The analysis is performed using attributed abstract syntax trees (AASTs). As part of the study, testing and comparative analysis of the effectiveness of the developed method are carried out. This method makes it possible to increase the efficiency of detecting functionally similar fragments of program code, compared to analogs, by using the semantic context of vertices in abstract syntax trees.

摘要 本文提出了一种预处理二进制程序代码片段的方法,以便随后使用机器学习方法检测它们的相似性。该方法基于对二进制代码片段反编译后得到的伪代码的分析。分析使用归属抽象语法树(AAST)进行。作为研究的一部分,对所开发方法的有效性进行了测试和比较分析。通过使用抽象语法树中顶点的语义上下文,该方法可以提高检测功能相似的程序代码片段的效率。
{"title":"Analysis of Decompiled Program Code Using Abstract Syntax Trees","authors":"N. A. Gribkov,&nbsp;T. D. Ovasapyan,&nbsp;D. A. Moskvin","doi":"10.3103/S0146411623080060","DOIUrl":"10.3103/S0146411623080060","url":null,"abstract":"<p>This article proposes a method for preprocessing fragments of binary program codes for subsequent detection of their similarity using machine learning methods. The method is based on the analysis of pseudocode obtained as a result of decompiling fragments of binary codes. The analysis is performed using attributed abstract syntax trees (AASTs). As part of the study, testing and comparative analysis of the effectiveness of the developed method are carried out. This method makes it possible to increase the efficiency of detecting functionally similar fragments of program code, compared to analogs, by using the semantic context of vertices in abstract syntax trees.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"57 8","pages":"958 - 967"},"PeriodicalIF":0.6,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140888807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
AUTOMATIC CONTROL AND COMPUTER SCIENCES
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1