
Ð’ данной работе изложен подход к защите приложений от ÑкÑплуатации уÑзвимоÑтей. РаÑÑмотрены различные уÑзвимоÑти и принципы их ÑкÑплуатации. Проведен анализ ÑущеÑтвующих решений. Разработан ÑобÑтвенный метод защиты. Разработана ÐºÐ¾Ð½ÐºÑ€ÐµÑ‚Ð½Ð°Ñ Ð¿Ñ€Ð¾Ð³Ñ€Ð°Ð¼Ð¼Ð½Ð°Ñ Ñ€ÐµÐ°Ð»Ð¸Ð·Ð°Ñ†Ð¸Ñ Ð´Ð°Ð½Ð½Ð¾Ð³Ð¾ метода.
In the given work an approach to protecting applications from exploitation of vulnerabilities outlined. Considered various vulnerabilities and principals of their operation. Existing solution were analyzed. Method of protection was developed. A specific software implementation of this method done.
IT-ÑÐµÑ Ð½Ð¾Ð»Ð¾Ð³Ð¸Ð¸, ÑÑзвимоÑÑи пÑогÑаммного обеÑпеÑениÑ, IT, vulnerabilities of portable executable, ÑамомодиÑикаÑиÑ, selfmodification, exploit, ÑкÑплойÑÑ, exploit protection, заÑиÑа Ð¾Ñ ÑкÑплÑаÑаÑии ÑÑзвимоÑÑей
IT-ÑÐµÑ Ð½Ð¾Ð»Ð¾Ð³Ð¸Ð¸, ÑÑзвимоÑÑи пÑогÑаммного обеÑпеÑениÑ, IT, vulnerabilities of portable executable, ÑамомодиÑикаÑиÑ, selfmodification, exploit, ÑкÑплойÑÑ, exploit protection, заÑиÑа Ð¾Ñ ÑкÑплÑаÑаÑии ÑÑзвимоÑÑей
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 0 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
