A. V. Nikolskiy

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
The search for errors and vulnerabilities in operating systems, implementations of network protocols, and software products is an important task in information security. Fuzzing is currently one of the most popular approaches to searching for vulnerabilities. It can provide the highest degree of automation compared to other approaches and, thus, it is(More)
This paper describes the architecture defects of existing hardware platforms have been analyzed. These defects allow software vulnerabilities exploitation. The authors propose to solve this problem by building a processor with secure-by-design architecture. Requirements for such a processor are formulated within this paper. Also the authors describe the(More)
A description has been provided for a formal model of cyber attack on virtualization tools that allow one to formulate condition for the security of virtualization tools. The concept of measuring the vulnerability of virtualization tools has been introduced that characterizes the predisposition of a system to vulnerabilities that contribute to the(More)
  • 1