Secure code execution system operation algorithm
The article presented a set of algorithms that form the basis of the safe code execution system. The functional purpose of it is to investigate arbitrary executable files of the operating system in the absence of source codes in order to provide the ability to control the execution of the program co...
Saved in:
| Published in | Trudy Instituta sistemnogo programmirovaniâ Vol. 29; no. 3; pp. 17 - 30 |
|---|---|
| Main Authors | , |
| Format | Journal Article |
| Language | English |
| Published |
Ivannikov Institute for System Programming of the Russian Academy of Sciences
01.10.2018
|
| Subjects | |
| Online Access | Get full text |
| ISSN | 2079-8156 2220-6426 2220-6426 |
| DOI | 10.15514/ISPRAS-2017-29(3)-2 |
Cover
| Abstract | The article presented a set of algorithms that form the basis of the safe code execution system. The functional purpose of it is to investigate arbitrary executable files of the operating system in the absence of source codes in order to provide the ability to control the execution of the program code within the specified functional requirements. The set of algorithms presented in this work includes: the algorithm for the functioning of a system for the safe execution of the program code; the algorithm for constructing a program model suitable for verification, which accurately preserves the properties of the source program. |
|---|---|
| AbstractList | The article presented a set of algorithms that form the basis of the safe code execution system. The functional purpose of it is to investigate arbitrary executable files of the operating system in the absence of source codes in order to provide the ability to control the execution of the program code within the specified functional requirements. The set of algorithms presented in this work includes: the algorithm for the functioning of a system for the safe execution of the program code; the algorithm for constructing a program model suitable for verification, which accurately preserves the properties of the source program. |
| Author | Kochetkov, E.V. Kozachok, A.V. |
| Author_xml | – sequence: 1 givenname: A.V. surname: Kozachok fullname: Kozachok, A.V. – sequence: 2 givenname: E.V. surname: Kochetkov fullname: Kochetkov, E.V. |
| BookMark | eNplkF1LwzAUhoNMcOr-gRe91IvoSdI2zeUYfgwGitPrcJqks6NrStKh-_fWTVTw6nzA8xzOe0pGrW8dIRcMrlmWsfRmvnx6ni4pByYpV5fiivIjMuacA81Tno-GHqSiBcvyEzKJcQ0APAMpgI0JLJ3ZBpcYb13iPoahr32bxF3s3SbxnQu4X2Cz8qHu3zbn5LjCJrrJdz0jr3e3L7MHuni8n8-mC2qGO5wabnJV2ipVhcidFQKxqFxmlQNWogOJIK2oDEvzgheFFSYHq2SJYJmSiOKMzA9e63Gtu1BvMOy0x1rvFz6sNIa-No3TpuCVqiRjlrsUOZZq-F0wJjKGYJgdXOnBtW073L1j0_wIGeh9irqOXcCov1LUXGmh-S9mgo8xuOo_dcj-DzVgn23aeHg |
| ContentType | Journal Article |
| DBID | AAYXX CITATION ADTOC UNPAY DOA |
| DOI | 10.15514/ISPRAS-2017-29(3)-2 |
| DatabaseName | CrossRef Unpaywall for CDI: Periodical Content Unpaywall [Open Access] DOAJ 오픈액세스 저널 디렉토리 |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: UNPAY name: Unpaywall url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/ sourceTypes: Open Access Repository |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 2220-6426 |
| EndPage | 30 |
| ExternalDocumentID | oai_doaj_org_article_c82f9f711d2e4a2ab9220311351a0c1d 10.15514/ispras-2017-29(3)-2 10_15514_ISPRAS_2017_29_3__2 |
| GroupedDBID | 642 AAYXX ALMA_UNASSIGNED_HOLDINGS CITATION GROUPED_DOAJ OK1 ADTOC UNPAY |
| ID | FETCH-LOGICAL-c1562-c2c69bdf49836ed33aa8fe5d9e01bae07a07d3fc1468288d3c60d97ba0d197aa3 |
| IEDL.DBID | DOA |
| ISSN | 2079-8156 2220-6426 |
| IngestDate | Fri Oct 03 12:50:24 EDT 2025 Tue Aug 19 20:42:34 EDT 2025 Tue Jul 01 03:28:25 EDT 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 3 |
| Language | English |
| License | cc-by |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c1562-c2c69bdf49836ed33aa8fe5d9e01bae07a07d3fc1468288d3c60d97ba0d197aa3 |
| OpenAccessLink | https://doaj.org/article/c82f9f711d2e4a2ab9220311351a0c1d |
| PageCount | 14 |
| ParticipantIDs | doaj_primary_oai_doaj_org_article_c82f9f711d2e4a2ab9220311351a0c1d unpaywall_primary_10_15514_ispras_2017_29_3_2 crossref_primary_10_15514_ISPRAS_2017_29_3__2 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 2018-10-01 |
| PublicationDateYYYYMMDD | 2018-10-01 |
| PublicationDate_xml | – month: 10 year: 2018 text: 2018-10-01 day: 01 |
| PublicationDecade | 2010 |
| PublicationTitle | Trudy Instituta sistemnogo programmirovaniâ |
| PublicationYear | 2018 |
| Publisher | Ivannikov Institute for System Programming of the Russian Academy of Sciences |
| Publisher_xml | – name: Ivannikov Institute for System Programming of the Russian Academy of Sciences |
| SSID | ssj0002507301 |
| Score | 2.0446293 |
| Snippet | The article presented a set of algorithms that form the basis of the safe code execution system. The functional purpose of it is to investigate arbitrary... |
| SourceID | doaj unpaywall crossref |
| SourceType | Open Website Open Access Repository Index Database |
| StartPage | 17 |
| SubjectTerms | алгоритм вредоносное программное обеспечение |
| SummonAdditionalLinks | – databaseName: Unpaywall dbid: UNPAY link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LT9wwELbocmg5FPoSFKhy6KE9eNePJI6PCwLRSkWodCV6shw_oOp2E2V31cevZybJ8hCnIuVia5RRZiae-WzPDCHvAcfyCNCHwkKoaVoCZrWZ5lS7KFwGMWpsjwu-nOYnk_TzRXbRZ_FjKsy8bux82CxHt-v3fOQrNweUztVI6JFEIiO0wQkjDVfD2scnZD3PIBofkPXJ6dn4O_aUYwp3uNoGruAFASWBN-qz5zBO6JlRfA8V-oP8SMU979QW8d8gT5ez2v79bafTO57neJPYVf5Od-Hk53C5KIfu38Nyjo_-qC3yvA9Lk3FnRy_IWpi9JJurlg9JvwK8Iqzdnw8JZsIn4Q8MULFJVw86qerQGVRip5dV82Nx9es1mRwffTs8oX3TBepAVII64XJd-pjqQubBS2ltEUPmdWC8tIEpy5SX0WHKligKL13OvFalZZ5rZa18Qwazaha2SeIwVkqZ92kJjwJsplOPB3sis4iMdghdCdvUXW0Ng5gElWM-nZ99HZ938gC5SGPEDjlAjdzQYmXsdqJqLk3_oxlXiKij4tyLkFphSw2qlxwbEVrmuAemN_p8yLVT1R2u4u1_0u-SZzDqSubyPTJYNMuwD3HLonzXm-Y1l1vnJw priority: 102 providerName: Unpaywall |
| Title | Secure code execution system operation algorithm |
| URI | http://ispras.ru/proceedings/docs/2017/29/3/isp_29_2017_3_17.pdf https://doaj.org/article/c82f9f711d2e4a2ab9220311351a0c1d |
| UnpaywallVersion | publishedVersion |
| Volume | 29 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAON databaseName: DOAJ Directory of Open Access Journals customDbUrl: eissn: 2220-6426 dateEnd: 20201231 omitProxy: true ssIdentifier: ssj0002507301 issn: 2220-6426 databaseCode: DOA dateStart: 20100101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV07T8MwELZQGYCBN6I8qgwMMER17Lw8FkRVkKgqSqUyWY7tQKWSVn0I-PfcJaEKYmBBypIoylnfXc732b47Qi6Ax3opUB8XHKFw_QQ4qwqE5wqdMh1AjJrm2wUP3bAz8O-HwbDS6gvPhBXlgQvgmjpmqUgjzzPM-oqpRDAGhoiN5RTVnkHvS2NRIVPog2FiR9PFznI0wnWuICzz5jBCaN71e4-tPlgIuGgmLvmVy37MS3n5_i2yscym6vNdjceVOae9S7bLYNFpFYPcI2s22yc7340YnPK_PCA0XzW3DuanO_YDbhBup6jS7EymtlCzo8Yvk9lo8fp2SAbt26ebjlu2QnA1DJ25mulQJCb1RcxDazhXKk5tYISlXqIsjRSNDE81JlKxODZch9SIKFHUeCJSih-RWjbJ7DFxNEYwPjXGT-CKgDEJ3-B2GwsU8pU6cb-BkNOi4oVEpoDAyQI4icBJJiSXktXJNaK1ehfrVecPQIuy1KL8S4sgdIX1b6mj-XSm5hWp7OQ_hJ6STfhkUd3WOyO1xWxpzyHEWCSN3JoaZH3Q7bWevwCUG8pN |
| linkProvider | Directory of Open Access Journals |
| linkToUnpaywall | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LT9wwELbocmg5FPoSFKhy6KE9eNePJI6PCwLRSkWodCV6shw_oOp2E2V31cevZybJ8hCnIuVia5RRZiae-WzPDCHvAcfyCNCHwkKoaVoCZrWZ5lS7KFwGMWpsjwu-nOYnk_TzRXbRZ_FjKsy8bux82CxHt-v3fOQrNweUztVI6JFEIiO0wQkjDVfD2scnZD3PIBofkPXJ6dn4O_aUYwp3uNoGruAFASWBN-qz5zBO6JlRfA8V-oP8SMU979QW8d8gT5ez2v79bafTO57neJPYVf5Od-Hk53C5KIfu38Nyjo_-qC3yvA9Lk3FnRy_IWpi9JJurlg9JvwK8Iqzdnw8JZsIn4Q8MULFJVw86qerQGVRip5dV82Nx9es1mRwffTs8oX3TBepAVII64XJd-pjqQubBS2ltEUPmdWC8tIEpy5SX0WHKligKL13OvFalZZ5rZa18Qwazaha2SeIwVkqZ92kJjwJsplOPB3sis4iMdghdCdvUXW0Ng5gElWM-nZ99HZ938gC5SGPEDjlAjdzQYmXsdqJqLk3_oxlXiKij4tyLkFphSw2qlxwbEVrmuAemN_p8yLVT1R2u4u1_0u-SZzDqSubyPTJYNMuwD3HLonzXm-Y1l1vnJw |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Secure+code+execution+system+operation+algorithm&rft.jtitle=Trudy+Instituta+sistemnogo+programmirovani%C3%A2&rft.au=A.+V.+Kozachok&rft.au=E.+V.+Kochetkov&rft.date=2018-10-01&rft.pub=Ivannikov+Institute+for+System+Programming+of+the+Russian+Academy+of+Sciences&rft.issn=2079-8156&rft.eissn=2220-6426&rft.volume=29&rft.issue=3&rft.spage=17&rft.epage=30&rft_id=info:doi/10.15514%2FISPRAS-2017-29%283%29-2&rft.externalDBID=DOA&rft.externalDocID=oai_doaj_org_article_c82f9f711d2e4a2ab9220311351a0c1d |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2079-8156&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2079-8156&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2079-8156&client=summon |