Dmitry P. Zegzhda

Learn More
In this paper, formal verification methodologies and the SPR (Safety Problem Resolver) model checking tool are used for verifying a security model's safety. The SPR tool makes it possible to analyze security issues on security systems based on the access control model. To illustrate this approach, a case study of the Simple Access Control Model (SACM) is(More)
Lots of upcoming IT trends are based on the concept of heterogeneous networks: Internet of Things is amongst them. Modern heterogeneous networks are characterized by hardly predictable behavior, hundreds of parameters of network nodes and connections and lack of single basis for development of control methods and algorithms. To overcome listed problems one(More)
Internet of Things (IoT) is one of the most rapidly developing information technology concept in the world. Ensuring the safety of IoT is a complex task which has not been completely solved so far. A prospective approach for security providing in IoT is development of a security information and event management (SIEM) system for IoT. For realizing this(More)
This paper reviews the task of trusted executable environment construction. It analyses current solutions, highlights their disadvantages. Requirements for trusted executable environment are provided. The article also presents an approach of hardware virtualization technology applying to perform specified task. Architecture of proposed trusted executable(More)
Rapidly expanding information technologies field clearly discovers tendency of increasing computer systems' heterogeneity and distribution level. In this paper authors reveal the hidden attributes of IT security evolution towards more assumptions about attacker power and less assertions on provided security level. The proposed view of IT security evolution(More)
Due to increasing popularity of mobile devices, detection of unknown mobile attack types stays up-to-date, but existing mobile security software aims at detecting known attacks. Offered method of anomaly detection in mobile devices behavior is based on power consumption homogeneity analysis. This method allows to detect deviations in normal behavior for(More)