Dmitry P. Zegzhda

Learn More
In this paper, formal verification methodologies and the SPR (Safety Problem Resolver) model checking tool are used for verifying a security model's safety. The SPR tool makes it possible to analyze security issues on security systems based on the access control model. To illustrate this approach, a case study of the Simple Access Control Model (SACM) is(More)
Lots of upcoming IT trends are based on the concept of heterogeneous networks: Internet of Things is amongst them. Modern heterogeneous networks are characterized by hardly predictable behavior, hundreds of parameters of network nodes and connections and lack of single basis for development of control methods and algorithms. To overcome listed problems one(More)
Internet of Things (IoT) is one of the most rapidly developing information technology concept in the world. Ensuring the safety of IoT is a complex task which has not been completely solved so far. A prospective approach for security providing in IoT is development of a security information and event management (SIEM) system for IoT. For realizing this(More)
This paper reviews the task of trusted executable environment construction. It analyses current solutions, highlights their disadvantages. Requirements for trusted executable environment are provided. The article also presents an approach of hardware virtualization technology applying to perform specified task. Architecture of proposed trusted executable(More)
Rapidly expanding information technologies field clearly discovers tendency of increasing computer systems' heterogeneity and distribution level. In this paper authors reveal the hidden attributes of IT security evolution towards more assumptions about attacker power and less assertions on provided security level. The proposed view of IT security evolution(More)
This paper describes the architecture defects of existing hardware platforms have been analyzed. These defects allow software vulnerabilities exploitation. The authors propose to solve this problem by building a processor with secure-by-design architecture. Requirements for such a processor are formulated within this paper. Also the authors describe the(More)
Protection technologies of initially vulnerable industrial control systems are based on network segregation, the logical separation of the control network from the corporate network, and the use of firewalls. Manufacturers of industrial equipment attempt to embed security functions (of authentication and PLC password protection), but without using(More)