{"id":"https://openalex.org/W2254784154","doi":"https://doi.org/10.1134/s0361768815040052","title":"Application of compiler transformations against software vulnerabilities exploitation","display_name":"Application of compiler transformations against software vulnerabilities exploitation","publication_year":2015,"publication_date":"2015-07-01","ids":{"openalex":"https://openalex.org/W2254784154","doi":"https://doi.org/10.1134/s0361768815040052","mag":"2254784154"},"language":"en","primary_location":{"id":"doi:10.1134/s0361768815040052","is_oa":false,"landing_page_url":"https://doi.org/10.1134/s0361768815040052","pdf_url":null,"source":{"id":"https://openalex.org/S150218641","display_name":"Programming and Computer Software","issn_l":"0361-7688","issn":["0361-7688","1608-3261"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320267","host_organization_name":"Pleiades Publishing","host_organization_lineage":["https://openalex.org/P4310320267","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Pleiades Publishing","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Programming and Computer Software","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5008804900","display_name":"\u0410. \u0420. \u041d\u0443\u0440\u043c\u0443\u0445\u0430\u043c\u0435\u0442\u043e\u0432","orcid":"https://orcid.org/0000-0001-7434-1754"},"institutions":[{"id":"https://openalex.org/I4210101868","display_name":"Institute for System Programming","ror":"https://ror.org/017ef8252","country_code":"RU","type":"facility","lineage":["https://openalex.org/I1313323035","https://openalex.org/I4210101868","https://openalex.org/I4210124601"]}],"countries":["RU"],"is_corresponding":true,"raw_author_name":"A. R. Nurmukhametov","raw_affiliation_strings":["Institute of System Programming, Russian Academy of Sciences, ul. Solzhenitsyna 25, Moscow, 109004, Russia"],"affiliations":[{"raw_affiliation_string":"Institute of System Programming, Russian Academy of Sciences, ul. Solzhenitsyna 25, Moscow, 109004, Russia","institution_ids":["https://openalex.org/I4210101868"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062354880","display_name":"\u0428. \u0424. \u041a\u0443\u0440\u043c\u0430\u043d\u0433\u0430\u043b\u0435\u0435\u0432","orcid":null},"institutions":[{"id":"https://openalex.org/I4210101868","display_name":"Institute for System Programming","ror":"https://ror.org/017ef8252","country_code":"RU","type":"facility","lineage":["https://openalex.org/I1313323035","https://openalex.org/I4210101868","https://openalex.org/I4210124601"]}],"countries":["RU"],"is_corresponding":false,"raw_author_name":"Sh. F. Kurmangaleev","raw_affiliation_strings":["Institute of System Programming, Russian Academy of Sciences, ul. Solzhenitsyna 25, Moscow, 109004, Russia"],"affiliations":[{"raw_affiliation_string":"Institute of System Programming, Russian Academy of Sciences, ul. Solzhenitsyna 25, Moscow, 109004, Russia","institution_ids":["https://openalex.org/I4210101868"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053153789","display_name":"V. V. Kaushan","orcid":null},"institutions":[{"id":"https://openalex.org/I4210101868","display_name":"Institute for System Programming","ror":"https://ror.org/017ef8252","country_code":"RU","type":"facility","lineage":["https://openalex.org/I1313323035","https://openalex.org/I4210101868","https://openalex.org/I4210124601"]}],"countries":["RU"],"is_corresponding":false,"raw_author_name":"V. V. Kaushan","raw_affiliation_strings":["Institute of System Programming, Russian Academy of Sciences, ul. Solzhenitsyna 25, Moscow, 109004, Russia"],"affiliations":[{"raw_affiliation_string":"Institute of System Programming, Russian Academy of Sciences, ul. Solzhenitsyna 25, Moscow, 109004, Russia","institution_ids":["https://openalex.org/I4210101868"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5112375694","display_name":"Serguei Gaissaryan","orcid":null},"institutions":[{"id":"https://openalex.org/I4210101868","display_name":"Institute for System Programming","ror":"https://ror.org/017ef8252","country_code":"RU","type":"facility","lineage":["https://openalex.org/I1313323035","https://openalex.org/I4210101868","https://openalex.org/I4210124601"]}],"countries":["RU"],"is_corresponding":false,"raw_author_name":"S. S. Gaissaryan","raw_affiliation_strings":["Institute of System Programming, Russian Academy of Sciences, ul. Solzhenitsyna 25, Moscow, 109004, Russia"],"affiliations":[{"raw_affiliation_string":"Institute of System Programming, Russian Academy of Sciences, ul. Solzhenitsyna 25, Moscow, 109004, Russia","institution_ids":["https://openalex.org/I4210101868"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5008804900"],"corresponding_institution_ids":["https://openalex.org/I4210101868"],"apc_list":null,"apc_paid":null,"fwci":2.5886,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.91769025,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"41","issue":"4","first_page":"231","last_page":"236"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11005","display_name":"Radiation Effects in Electronics","score":0.9585999846458435,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/executable","display_name":"Executable","score":0.8894639015197754},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8085111379623413},{"id":"https://openalex.org/keywords/compiler","display_name":"Compiler","score":0.7380141019821167},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.6242203712463379},{"id":"https://openalex.org/keywords/population","display_name":"Population","score":0.5704752802848816},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5460304617881775},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.49025681614875793},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.45644786953926086},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.42143067717552185},{"id":"https://openalex.org/keywords/buffer-overflow","display_name":"Buffer overflow","score":0.41450926661491394},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.3826919198036194},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3102470636367798}],"concepts":[{"id":"https://openalex.org/C160145156","wikidata":"https://www.wikidata.org/wiki/Q778586","display_name":"Executable","level":2,"score":0.8894639015197754},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8085111379623413},{"id":"https://openalex.org/C169590947","wikidata":"https://www.wikidata.org/wiki/Q47506","display_name":"Compiler","level":2,"score":0.7380141019821167},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6242203712463379},{"id":"https://openalex.org/C2908647359","wikidata":"https://www.wikidata.org/wiki/Q2625603","display_name":"Population","level":2,"score":0.5704752802848816},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5460304617881775},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.49025681614875793},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.45644786953926086},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.42143067717552185},{"id":"https://openalex.org/C40842320","wikidata":"https://www.wikidata.org/wiki/Q19423","display_name":"Buffer overflow","level":2,"score":0.41450926661491394},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3826919198036194},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3102470636367798},{"id":"https://openalex.org/C149923435","wikidata":"https://www.wikidata.org/wiki/Q37732","display_name":"Demography","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1134/s0361768815040052","is_oa":false,"landing_page_url":"https://doi.org/10.1134/s0361768815040052","pdf_url":null,"source":{"id":"https://openalex.org/S150218641","display_name":"Programming and Computer Software","issn_l":"0361-7688","issn":["0361-7688","1608-3261"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320267","host_organization_name":"Pleiades Publishing","host_organization_lineage":["https://openalex.org/P4310320267","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Pleiades Publishing","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Programming and Computer Software","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.44999998807907104,"id":"https://metadata.un.org/sdg/10","display_name":"Reduced inequalities"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W126603867","https://openalex.org/W1546727207","https://openalex.org/W2027963645","https://openalex.org/W2083168478","https://openalex.org/W2098010707","https://openalex.org/W2121468041","https://openalex.org/W2147625551","https://openalex.org/W2160418053","https://openalex.org/W2243269234","https://openalex.org/W2465608671","https://openalex.org/W6694145885"],"related_works":["https://openalex.org/W107132618","https://openalex.org/W2357088637","https://openalex.org/W1972760175","https://openalex.org/W2887198767","https://openalex.org/W2376963926","https://openalex.org/W4233969565","https://openalex.org/W4283264706","https://openalex.org/W4387360145","https://openalex.org/W1515699938","https://openalex.org/W946883631"],"abstract_inverted_index":{"Software":[0],"vulnerabilities":[1],"are":[2],"a":[3,53,80,108],"serious":[4],"threat":[5],"for":[6,38,94,122],"security":[7],"of":[8,19,22,32,56,72,83,86,98,125,132],"information":[9],"systems.":[10],"Any":[11],"software":[12],"written":[13],"in":[14],"C/C++":[15],"contain":[16],"considerable":[17],"amount":[18],"vulnerabilities.":[20],"Some":[21],"them":[23],"can":[24,114],"be":[25],"used":[26],"by":[27,50],"attackers":[28],"to":[29,44,78,138],"seize":[30],"control":[31],"the":[33,61,68,87,99,103,112,126,133],"system.":[34],"In":[35],"this":[36,123,139],"paper,":[37],"counteracting":[39],"such":[40],"vulnerabilities,":[41],"we":[42],"propose":[43],"use":[45],"compiler":[46],"transformations:":[47],"function":[48],"reordering":[49],"permutation":[51],"within":[52],"module,":[54],"insertion":[55],"additional":[57],"local":[58,64],"variables":[59,65],"into":[60],"function\u2019s":[62],"stack,":[63],"hashing":[66],"on":[67,102],"stack.":[69],"By":[70],"means":[71],"these":[73],"transformations,":[74],"it":[75],"is":[76],"suggested":[77],"generate":[79],"diversified":[81],"population":[82,134],"executable":[84,110,130],"files":[85,131],"application":[88],"being":[89],"compiled.":[90],"Such":[91],"an":[92,116],"approach,":[93],"example,":[95],"complicates":[96],"planning":[97],"ROP":[100,117],"attacks":[101],"entire":[104],"population.":[105],"Having":[106],"obtained":[107],"single":[109],"file,":[111],"attacker":[113],"create":[115],"exploit,":[118],"which":[119],"works":[120],"only":[121],"version":[124],"application.":[127],"The":[128],"other":[129],"will":[135],"remain":[136],"insensitive":[137],"attack.":[140]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
