Sistemy i Sredstva Informatiki [Systems and Means of Informatics]
RUS  ENG    JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB  
General information
Latest issue
Archive
Impact factor

Search papers
Search references

RSS
Latest issue
Current issues
Archive issues
What is RSS



Sistemy i Sredstva Inform.:
Year:
Volume:
Issue:
Page:
Find






Personal entry:
Login:
Password:
Save password
Enter
Forgotten password?
Register


Sistemy i Sredstva Informatiki [Systems and Means of Informatics], 2015, Volume 25, Issue 3, Pages 94–108
DOI: https://doi.org/10.14357/08696527150306
(Mi ssi419)
 

This article is cited in 1 scientific paper (total in 1 paper)

Problems of interaction of the malicious code and protection programs in architecture of modern operating systems

R. R. Giliazova, A. A. Grushob

a Faculty of Computational Mathematics and Cybernetics, M. V. Lomonosov Moscow State University, 1-52 Leninskiye Gory, GSP-1, Moscow 119991, Russian Federation
b Institute of Informatics Problems, Federal Research Center "Computer Science and Control" of the Russian Academy of Sciences, 44-2 Vavilov Str., Moscow 119333, Russian Federation
Full-text PDF (667 kB) Citations (1)
References:
Abstract: The paper considers the interaction between malware and security software environments of modern operating systems. In particular, a number of aspects which are related to the software module that provides an opportunity for sustainable and undetectable presence of the offender in computer systems is considered. A number of statements is made about relationships between the technologies used in security software and ensuring “invisibility” of the executable malicious code. The possibility of undetectable rootkit presence in modern security software is shown on practice. In addition, the mechanism of system calls and drivers subsystem of Windows NT is analyzed. Furthermore, necessary practical requirements for implementation of security software are developed. The model of random restriction of malicious software for security software is constructed.
Keywords: information security; security software; malicious software; rootkit; antivirus; technologies of hiding execution code.
Funding agency Grant number
Russian Foundation for Basic Research 15-07-02053
Received: 19.08.2015
Bibliographic databases:
Document Type: Article
Language: Russian
Citation: R. R. Giliazov, A. A. Grusho, “Problems of interaction of the malicious code and protection programs in architecture of modern operating systems”, Sistemy i Sredstva Inform., 25:3 (2015), 94–108
Citation in format AMSBIB
\Bibitem{GilGru15}
\by R.~R.~Giliazov, A.~A.~Grusho
\paper Problems of interaction of the malicious code and protection programs in architecture of modern operating systems
\jour Sistemy i Sredstva Inform.
\yr 2015
\vol 25
\issue 3
\pages 94--108
\mathnet{http://mi.mathnet.ru/ssi419}
\crossref{https://doi.org/10.14357/08696527150306}
\elib{https://elibrary.ru/item.asp?id=24347067}
Linking options:
  • https://www.mathnet.ru/eng/ssi419
  • https://www.mathnet.ru/eng/ssi/v25/i3/p94
  • This publication is cited in the following 1 articles:
    Citing articles in Google Scholar: Russian citations, English citations
    Related articles in Google Scholar: Russian articles, English articles
    Системы и средства информатики
    Statistics & downloads:
    Abstract page:351
    Full-text PDF :196
    References:44
     
      Contact us:
     Terms of Use  Registration to the website  Logotypes © Steklov Mathematical Institute RAS, 2024