Sistemy i Sredstva Informatiki [Systems and Means of Informatics]
RUS  ENG    JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB  
General information
Latest issue
Archive
Impact factor

Search papers
Search references

RSS
Latest issue
Current issues
Archive issues
What is RSS



Sistemy i Sredstva Inform.:
Year:
Volume:
Issue:
Page:
Find






Personal entry:
Login:
Password:
Save password
Enter
Forgotten password?
Register


Sistemy i Sredstva Informatiki [Systems and Means of Informatics], 2021, Volume 31, Issue 2, Pages 4–15
DOI: https://doi.org/10.14357/08696527210201
(Mi ssi760)
 

This article is cited in 1 scientific paper (total in 1 paper)

Hidden impact without malicious code

A. A. Grushoa, N. A. Grushoa, M. I. Zabezhailob, E. E. Timoninaa

a Institute of Informatics Problems, Federal Research Center "Computer Sciences and Control" of the Russian Academy of Sciences, 44-2 Vavilov Str., Moscow 119133, Russian Federation
b A. A. Dorodnicyn Computing Center, Federal Research Center "Computer Science and Control" of Russian Academy of Sciences, 40 Vavilov Str., Moscow 119333, Russian Federation
Full-text PDF (226 kB) Citations (1)
References:
Abstract: The paper reflects a number of problems related to threats to distributed information systems due to the presence of BackDoor. The usage of BackDoor to attack distributed computer systems has great advantages over the traditional usage of malicious code. In fact, the usage of BackDoor is difficult to identify as a special attack, i. e., distinguish from error in computing processes. However, building attacks with BackDoor is much more difficult than building attacks with malicious code. The example of BackDoor is built using the initial data of information technology. This approach to the construction of BackDoor was not found in any of the descriptions of BackDoor. The paper shows that the existing technologies for finding vulnerabilities in the hardware and software of the system do not solve the problems of searching for BackDoor. Mathematical models and methods for solving BackDoor search problems, except in particular cases, have not yet been developed. It is important that BackDoor is not associated with the introduction of malicious code into the computer system and with the usage of malicious code to cause damage. Therefore, as a rule, the mechanism of causing damage through BackDoor differs from the action of malicious code.
Keywords: information security, BackDoor, BackDoor through data.
Funding agency Grant number
Russian Foundation for Basic Research 18-29-03081_мк
The paper was partially supported by the Russian Foundation for Basic Research (project 18-29-03081).
Received: 15.03.2021
Document Type: Article
Language: Russian
Citation: A. A. Grusho, N. A. Grusho, M. I. Zabezhailo, E. E. Timonina, “Hidden impact without malicious code”, Sistemy i Sredstva Inform., 31:2 (2021), 4–15
Citation in format AMSBIB
\Bibitem{GruGruZab21}
\by A.~A.~Grusho, N.~A.~Grusho, M.~I.~Zabezhailo, E.~E.~Timonina
\paper Hidden impact without malicious code
\jour Sistemy i Sredstva Inform.
\yr 2021
\vol 31
\issue 2
\pages 4--15
\mathnet{http://mi.mathnet.ru/ssi760}
\crossref{https://doi.org/10.14357/08696527210201}
Linking options:
  • https://www.mathnet.ru/eng/ssi760
  • https://www.mathnet.ru/eng/ssi/v31/i2/p4
  • This publication is cited in the following 1 articles:
    Citing articles in Google Scholar: Russian citations, English citations
    Related articles in Google Scholar: Russian articles, English articles
    Системы и средства информатики
    Statistics & downloads:
    Abstract page:558
    Full-text PDF :59
    References:16
     
      Contact us:
     Terms of Use  Registration to the website  Logotypes © Steklov Mathematical Institute RAS, 2024