{"id":"https://openalex.org/W4210656948","doi":"https://doi.org/10.3103/s0146411621070233","title":"On the Detection of Exploitation of Vulnerabilities That Leads to the Execution of a Malicious Code","display_name":"On the Detection of Exploitation of Vulnerabilities That Leads to the Execution of a Malicious Code","publication_year":2021,"publication_date":"2021-12-01","ids":{"openalex":"https://openalex.org/W4210656948","doi":"https://doi.org/10.3103/s0146411621070233"},"language":"en","primary_location":{"id":"doi:10.3103/s0146411621070233","is_oa":false,"landing_page_url":"https://doi.org/10.3103/s0146411621070233","pdf_url":null,"source":{"id":"https://openalex.org/S17203304","display_name":"Automatic Control and Computer Sciences","issn_l":"0146-4116","issn":["0146-4116","1558-108X"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320267","host_organization_name":"Pleiades Publishing","host_organization_lineage":["https://openalex.org/P4310320267","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Pleiades Publishing","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Automatic Control and Computer Sciences","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011133256","display_name":"Y. V. Kosolapov","orcid":"https://orcid.org/0000-0002-1491-524X"},"institutions":[{"id":"https://openalex.org/I137534880","display_name":"Southern Federal University","ror":"https://ror.org/01tv9ph92","country_code":"RU","type":"education","lineage":["https://openalex.org/I137534880"]}],"countries":["RU"],"is_corresponding":true,"raw_author_name":"Y. V. Kosolapov","raw_affiliation_strings":["Southern Federal University, 344090, Rostov-on-Don, Russia"],"raw_orcid":"https://orcid.org/0000-0002-1491-524X","affiliations":[{"raw_affiliation_string":"Southern Federal University, 344090, Rostov-on-Don, Russia","institution_ids":["https://openalex.org/I137534880"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5011133256"],"corresponding_institution_ids":["https://openalex.org/I137534880"],"apc_list":null,"apc_paid":null,"fwci":0.1542,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.48909553,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":"55","issue":"7","first_page":"827","last_page":"837"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.9264724850654602},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.6634187698364258},{"id":"https://openalex.org/keywords/secure-coding","display_name":"Secure coding","score":0.6025664210319519},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5880022644996643},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.45540153980255127},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.15795579552650452},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.08376553654670715}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.9264724850654602},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.6634187698364258},{"id":"https://openalex.org/C22680326","wikidata":"https://www.wikidata.org/wiki/Q7444867","display_name":"Secure coding","level":5,"score":0.6025664210319519},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5880022644996643},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.45540153980255127},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.15795579552650452},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.08376553654670715},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3103/s0146411621070233","is_oa":false,"landing_page_url":"https://doi.org/10.3103/s0146411621070233","pdf_url":null,"source":{"id":"https://openalex.org/S17203304","display_name":"Automatic Control and Computer Sciences","issn_l":"0146-4116","issn":["0146-4116","1558-108X"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320267","host_organization_name":"Pleiades Publishing","host_organization_lineage":["https://openalex.org/P4310320267","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Pleiades Publishing","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Automatic Control and Computer Sciences","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W1963947298","https://openalex.org/W2135143063","https://openalex.org/W2169685348","https://openalex.org/W2512784977","https://openalex.org/W2810666735","https://openalex.org/W2958285686","https://openalex.org/W3128550385","https://openalex.org/W3134685499","https://openalex.org/W4250634129","https://openalex.org/W4302784197"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278","https://openalex.org/W2478288626","https://openalex.org/W1631032283","https://openalex.org/W1643546019","https://openalex.org/W2167151567"],"abstract_inverted_index":{"Software":[0],"protection":[1],"from":[2,54,80],"exploitation":[3],"of":[4,27,46,97,106,109,114,141,155,173],"possible":[5],"unknown":[6,82],"vulnerabilities":[7,23],"can":[8],"be":[9],"ensured":[10],"both":[11],"by":[12,25,42],"searching":[13],"for":[14,87,187,198],"(for":[15],"example,":[16],"using":[17,160],"symbolic":[18],"execution)":[19],"and":[20,24,50,111,181,195,203],"subsequently":[21],"eliminating":[22],"means":[26],"detection":[28],"and/or":[29,162],"intrusion":[30],"prevention":[31],"systems.":[32],"In":[33],"the":[34,55,93,124,135,138,153,167,174,178,182,211],"latter":[35],"case,":[36],"this":[37,69,88],"problem":[38],"is":[39,58,71,90,117,123,132,185,210],"usually":[40],"solved":[41],"forming":[43],"a":[44,74,104,156,196],"profile":[45,96],"normal":[47,56,94],"program":[48,98,188],"execution":[49,95,154,202],"an":[51,61,193],"unacceptable":[52],"deviation":[53],"behavior":[57],"regarded":[59],"as":[60,134],"anomaly":[62],"or":[63],"attack.":[64],"The":[65,84],"task":[66],"considered":[67],"in":[68,100,137,177],"study":[70,191],"to":[72,91],"protect":[73],"given":[75],"executable":[76],"file":[77],"(program)":[78],"P":[79,209],"exploiting":[81],"vulnerabilities.":[83],"method":[85],"proposed":[86],"purpose":[89],"construct":[92],"P,":[99],"which":[101],"not":[102],"only":[103],"set":[105],"legal":[107],"chains":[108],"system":[110,161,197],"library":[112,163],"functions":[113],"length":[115],"l":[116],"taken":[118],"into":[119,145],"consideration,":[120],"but":[121],"so":[122],"distance":[125,131,168],"between":[126,148,169],"adjacent":[127],"function":[128,149,164],"calls.":[129],"This":[130,190],"calculated":[133],"difference":[136],"call":[139,184],"addresses":[140],"respective":[142],"functions.":[143],"Taking":[144],"account":[146],"distances":[147],"calls":[150,165,175],"allows":[151],"detecting":[152,199],"malicious":[157],"shell":[158,179],"code":[159,180,201],"when":[166,208],"at":[170],"least":[171],"one":[172],"used":[176],"preceding":[183],"untypical":[186],"P.":[189],"constructs":[192],"algorithm":[194],"abnormal":[200],"describes":[204],"several":[205],"tests":[206],"conducted":[207],"Firefox":[212],"browser.":[213]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
