<?xml version="1.0" encoding="utf-8"?>
<journal>
  <titleid>9004</titleid>
  <issn>2071-8217</issn>
  <journalInfo lang="ENG">
    <title>Problems of information security. Computer systems</title>
  </journalInfo>
  <issue>
    <number>Спецвыпуск</number>
    <altNumber> </altNumber>
    <dateUni>2024</dateUni>
    <pages>1-176</pages>
    <articles>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>10-16</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0002-8627-4947</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Busygin</surname>
              <initials>Alexey</initials>
              <email>a.busygin@ibks.spbstu.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0002-9732-0099</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Kalinin</surname>
              <initials>Maxim</initials>
              <email>max@ibks.spbstu.ru</email>
              <address>Russia, 195251, St. Petersburg, Polytechnicheskaya str., 29</address>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">A concept of the protected distributed ledger technology for smart city digital environment</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">This paper analyzes the security of the common distributed consensus algorithms used in smart city distributed ledgers. There is proposed a concept of smart city distributed ledgers protection, which applies a hybrid distributed consensus protocol based on the joint use of the tangle class algorithm and the proof-of-authority class algorithm, protected by trusted computing and remote attestation technologies. The proposed protocol compensates for the weaknesses and vulnerabilities of the conventional distributed consensus algorithms that are inherent in distributed ledger technology and hinder its widespread use in large-scale smart city systems</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/1tfk-825g-8gp7</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>smart city</keyword>
            <keyword>distributed ledger technology</keyword>
            <keyword>security</keyword>
            <keyword>distributed consensus algorithm</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2024.17.1/</furl>
          <file>2024_spetsvipusk-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>17-23</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0003-0623-9891</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Gololobov</surname>
              <initials>Nikita</initials>
              <email>gololobov_nv@spbstu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Formal statement of the problem of morphizing executive code during the work of software</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">This article presents a formal formulation of the problem of modifying executable code during execution based on morphing used in computer animation. In the course of the research, the need for developing a morphing method for software was substantiated, and the basic principles used in computer animation were adapted for the field of cybersecurity, and vectors for further research in this direction were determined. The results obtained during the adaptation should be used in the design and implementation of the morphing method for executable code</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/kgh3-84nt-b5z2</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>cybersecurity</keyword>
            <keyword>executable file protection</keyword>
            <keyword>binary morphing</keyword>
            <keyword>protection against ROP chains</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2024.17.2/</furl>
          <file>2024_spetsvipusk-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>24-30</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Goretsky</surname>
              <initials>Ilya</initials>
              <email>vaasabb@mail.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0003-2849-4682</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Lavrova </surname>
              <initials>Daria</initials>
              <email>lavrova_ds@spbstu.ru</email>
              <address>Russia, 195251, St. Petersburg, Polytechnicheskaya str., 29</address>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Intelligent recommender system for counteracting network attacks</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">This paper is devoted to an approach to countering network attacks based on network reconfiguration to exclude the possibility of successful completion of the attack. To implement the approach, it is proposed to use the mechanism of recommender systems that provides both generation of possible network topologies and their ranking. The proposed intelligent recommender system is based on a reinforcement learning algorithm based on the actor - critic model. Experimental studies have confirmed the effectiveness of the developed system</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/gxt5-d3m3-5ku4</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>reinforcement learning</keyword>
            <keyword>DDoS</keyword>
            <keyword>network attack</keyword>
            <keyword>recommender system</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2024.17.3/</furl>
          <file>2024_spetsvipusk-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>31-45</pages>
        <authors>
          <author num="001">
            <authorCodes/>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Gribkov</surname>
              <initials>Nikita</initials>
              <email>gribkov.na@edu.spbstu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Method for binary code searching based on syntactic and semantic features of the query sample</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The paper analyzes the syntactic and semantic characteristics used to identify the similarity of binary code fragments, presents the results of analysis on the effectiveness of decompilation techniques and methods for syntactic similarity detection in the context of code clone detection task. Method for searching the code clones is proposed, which includes analyzing both semantic and syntactic features of the binary code snippets. The results of a comparative analysis of the effectiveness of the proposed method are presented</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/6a2t-ggzk-m5ez</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>syntactic similarity</keyword>
            <keyword>semantic similarity</keyword>
            <keyword>pseudocode</keyword>
            <keyword>binary code search</keyword>
            <keyword>code reusage</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2024.17.4/</furl>
          <file>2024_spetsvipusk-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>46-55</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Zavadskii</surname>
              <initials>Evgeniy </initials>
              <email>zavadskij_ev@spbstu.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Bulat</surname>
              <initials>Andrey</initials>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Method for searching for clones of program code in binary executable files</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The current trend of increasing labor productivity and efficiency of business processes entails optimization of software development processes through the use of generative artificial intelligence models trained on various code bases and manual copying of code fragments. Taking into account the growing number of reported vulnerabilities, methods for detecting clones of program code are needed. In this paper, we propose a method for evaluating the similarity of fragments of the program code of binary executable files, which is based on the representation of the code in the form of an FA-AAST tree and the apparatus of graph neural networks. The results obtained during testing on open and closed source software demonstrate the correctness of the proposed method and higher accuracy in comparison with considered solutions</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/kxfu-f8dz-7f8n</doi>
          <udk>004.94</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>code clone</keyword>
            <keyword>AST</keyword>
            <keyword>FA-AAST</keyword>
            <keyword>graph neural network</keyword>
            <keyword>cybersecurity</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2024.17.5/</furl>
          <file>2024_spetsvipusk-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>56-64</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0009-0000-3181-4769</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Kostin</surname>
              <initials>Sergey</initials>
              <email>s8kostin@gmail.com</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0002-7485-4848</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Aleksandrova </surname>
              <initials>Elena</initials>
              <email>aleksandrova_eb@spbstu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">About masking method in aggregate signature protocol based on isogenies of elliptic curve</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The main mathematical mechanism chosen by NIST (National Institute of Standards and Technology) for standardization is the lattice, while the hash function mechanism is an alternative. Unlike isogenies of elliptic curves, these mechanisms use a larger size of both public keys and signatures. Using the example of aggregate signature protocol based on isogenies of elliptic curves, we will show how the masking method can be used to prevent the main attack on this mechanism, while obtaining a smaller signature size. Post-quantum cryptography, aggregate signature, isogenies</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/2p7f-pp93-8ftg</doi>
          <udk>004.056.53</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>post-quantum cryptography</keyword>
            <keyword>multiple signature</keyword>
            <keyword>isogeny</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2024.17.6/</furl>
          <file>2025_spetsvipusk-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>65-75</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0009-0008-4442-5365</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Kubrin</surname>
              <initials>Georgiy</initials>
              <email>kubrin@ibks.spbstu.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <scopusid>13103571000</scopusid>
              <orcid>0000-0002-0232-7248</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Zegzhda</surname>
              <initials>Dmitry</initials>
              <email>zegzhda_dp@spbstu.ru</email>
              <address>Russia, 195251, St. Petersburg, Polytechnicheskaya str., 29</address>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Vulnerability detection in multicomponent software using a set of generalized code graph representations</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The paper presents a survey of existing software security analysis method and their ability to detect vulnerabilities caused by errors in several software components implemented in different programming languages. A set of three generalized code graph representations is proposed for implementation of software security analysis methods with consideration for interaction between components written in different programming languages. A software security analysis system architecture and a prototype of a system that uses proposed generalized code graph representation was developed. The prototype supports analysis of software components written in PHP, C and. NET based programming languages</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/nb67-m5g8-mpae</doi>
          <udk>004.56</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>software vulnerabilities detection</keyword>
            <keyword>logical vulnerabilities</keyword>
            <keyword>static code analysis</keyword>
            <keyword>graph theory</keyword>
            <keyword>multicomponent software analysis</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2024.17.7/</furl>
          <file>2024_spetsvipusk-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>76-91</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0003-1345-1874</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Pavlenko</surname>
              <initials>Evgeny</initials>
              <email>pavlenko_eyu@spbstu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Intelligent synthesis of cyber-resilient network structures: methods, experiments and architectural implementation</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The paper is devoted to the implementation of intelligent synthesis of cyber-resistant structures. We propose methods that implement the synthesis both at the stage of building a network structure and at the stage of its recovery when an attack or failure occurs. Experimental results confirming the effectiveness of the proposed methods are presented. The architecture of the system for recognizing cyber threats and intelligent synthesis of cyber-resilient network structures is described</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/8671-tgnf-tpv2</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>functional isomorphism</keyword>
            <keyword>target function</keyword>
            <keyword>synthesis</keyword>
            <keyword>critical nodes</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2024.17.8/</furl>
          <file>2024_spetsvipusk-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>92-103</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0003-1345-1874</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Pavlenko</surname>
              <initials>Evgeny</initials>
              <email>pavlenko_eyu@spbstu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Criteria for synthesizing cyber resilient network structures</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The concept of cyber resilience of complex systems is largely determined by the ability of their network structures to be rebuilt in such a way as to neutralize the impact of an attack already implemented on the system or to make its successful implementation impossible when detected at an early stage. It is proposed to solve the problem of synthesis to ensure cyber resilience of network structures both at the stage of system design (synthesis “from scratch”) and at the stage of their operation (synthesis-restructuring). The paper presents modeling of the impact of massive and targeted attacks on the system, considers the constraints on synthesis, and formulates synthesis criteria in terms of graph theory. The obtained theoretical results are the basis for practical construction of cyber-resistant network structures and their rebuilding under attack</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/pp8f-ruuh-bnax</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>cyber resilience</keyword>
            <keyword>target function</keyword>
            <keyword>synthesis</keyword>
            <keyword>graph stability</keyword>
            <keyword>graph integrity</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2024.17.9/</furl>
          <file>2024_spetsvipusk-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>104-117</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0009-0001-3593-1417</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Paguba</surname>
              <initials>Grigoriy</initials>
              <email>paguba.gyu@edu.spbstu.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0009-0008-8784-8720</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Sobolev</surname>
              <initials>Nikolay</initials>
              <email>sobolev.nv@edu.spbstu.ru</email>
            </individInfo>
          </author>
          <author num="003">
            <authorCodes>
              <orcid>0009-0001-5299-1884</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Permyakov</surname>
              <initials>Danil</initials>
              <email>permyakov.dn@edu.spbstu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Analysis of methods and instruments of information security using hardware virtualization technology of arm architecture</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The paper presents a review of software tools for information security that use hardware virtualization technology on the ARM architecture. For each tool considered, a brief description is provided, along with its advantages and disadvantages. The results of a comparative analysis of the reviewed tools are presented, highlighting the research directions in the field that require the most attention</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/grre-vhfd-9vn3</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>information security</keyword>
            <keyword>software</keyword>
            <keyword>virtualization</keyword>
            <keyword>hypervisor</keyword>
            <keyword>ARM</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2024.17.10/</furl>
          <file>2024_spetsvipusk-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>118-128</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0009-0006-6856-2108</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Pahomov</surname>
              <initials>Maksim</initials>
              <email>pahomov_ma@spbstu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Protection of ad-hoc networks against distributed scanning from the Internet</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The features of ad-hoc network scanning have been studied and methods for its detection have been analyzed. A modification of the hybrid method for detecting scanning from the Internet has been proposed, along with methods for identifying decoy scanning and creating blacklists of subnets to prevent further scanning. The proposed protection methods have been compared with existing counterparts</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/pdh9-5588-k2gv</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>information security</keyword>
            <keyword>ad-hoc networks</keyword>
            <keyword>network scanning</keyword>
            <keyword>IP address spoofing</keyword>
            <keyword>subnetwork blacklists</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2024.17.11/</furl>
          <file>2024_spetsvipusk-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>129-145</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0003-1511-9971</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Polosukhin</surname>
              <initials>Nikita</initials>
              <email>polosukhin.ibks@spbstu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Assessment of the descriptive ability of modern data sources for analyzing cyber security threats</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">This article proposes a classification of attributes of cybersecurity threats. A statistical study of the descriptive power of an open and closed threat dataset is presented. An expert study of an advanced persistent threat was also conducted using open reports as an example. The completeness of the threat description, as well as the ability of modern tools and protocols to describe such a threat, are assessed. The main conclusion is that current approaches to describing cybersecurity threats have shortcomings that prevent the most effective use of such information in operational activities</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/1nen-rerv-vr94</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>cybersecurity threats</keyword>
            <keyword>“pyramid of pain”</keyword>
            <keyword>tactics</keyword>
            <keyword>techniques and procedures</keyword>
            <keyword>threat description protocols</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2024.17.12/</furl>
          <file>2024_spetsvipusk-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>146-156</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0001-9659-1244</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Poltavtseva</surname>
              <initials>Maria </initials>
              <email>potavtseva@ibks.spbstu.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0009-0004-8915-7545</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Podorov</surname>
              <initials>Andrey</initials>
              <email>podorov.aa@edu.spbstu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Verification of access control in big data systems using temporal logics</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">Ensuring consistent access control is one of the key security challenges in heterogeneous Big Data systems. The problem is presented by the large number of data processing tools, information sources and users; heterogeneity of security models; complexity of granular access rules. Analyzing the time factor in this case will improve the consistency and reliability of access differentiation. The aim of the work is to select a methodology and tools for the implementation of temporal logic in the verification processes of access control of Big Data systems. The paper analyzes types of temporal logic and verification methods based on TLA (temporal logic of actions). We propose the use of TLA+ to solve this problem and give an example of the corresponding specification</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/frzb-mgge-6d24</doi>
          <udk>004.056.5</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>information security</keyword>
            <keyword>Big Data</keyword>
            <keyword>heterogeneous data processing systems</keyword>
            <keyword>access control</keyword>
            <keyword>verification</keyword>
            <keyword>temporal logic</keyword>
            <keyword>TLA+</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2024.17.13/</furl>
          <file>2024_spetsvipusk-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>157-164</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0009-0007-4911-8471</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Research Institute «Kvant»</orgName>
              <surname>Samarin</surname>
              <initials>Nikolay</initials>
              <email>samarin_nik@mail.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Methodology for finding errors and nondeclared features in software</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The paper proposes a methodology of searching for errors and undeclared capabilities in software, which is based on: a graph model of software operation, a method of estimating the achievability of basic software blocks, a mechanism of general simulations and a method of point fuzzing which is using this mechanism</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/p4m6-3pz2-1pdt</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>information security</keyword>
            <keyword>software</keyword>
            <keyword>error detection</keyword>
            <keyword>methodology</keyword>
            <keyword>symbolic execution</keyword>
            <keyword>fuzzing</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2024.17.14/</furl>
          <file>2024_spetsvipusk-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>165-175</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0009-0008-0568-7223</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Tsurkan</surname>
              <initials>Ivan</initials>
              <email>tsurkan.is@edu.spbstu.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Malyshev</surname>
              <initials>Egor</initials>
              <email>malyshev@ibks.spbstu.ru</email>
            </individInfo>
          </author>
          <author num="003">
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Zubkov</surname>
              <initials>Evgeny</initials>
              <email>zubkov.e@edu.spbstu.ru</email>
            </individInfo>
          </author>
          <author num="004">
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Moskvin</surname>
              <initials>Dmitry</initials>
              <email>moskvin_da@spbstu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Using adversarial attacks to protect against automatic text recognition in CAPTCHA services</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The paper proposes a method of CAPTCHA generation using adversarial attacks with respect to the image recognition model. The advantages of this method are determined based on comparative analysis of statistical data obtained as a result of the study. The developed method allows increasing the efficiency of counteraction against automatic bypassing of CAPTCHA services due to the use of insecurity of neural network models from malicious influence</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/hd61-2rx5-fd6r</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>adversarial attacks</keyword>
            <keyword>text recognition</keyword>
            <keyword>denial of service</keyword>
            <keyword>CAPTCHA services</keyword>
            <keyword>machine learning</keyword>
            <keyword>Python</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2024.17.15/</furl>
          <file>2024_spetsvipusk-5-6.pdf</file>
        </files>
      </article>
    </articles>
  </issue>
</journal>
