Abstract

In the article by Y. V. Kosolapov “On the Detection of Exploitation of Vulnerabilities Leading to the Execution of a Malicious Code” (Modeling and analysis of information systems, vol. 27, no. 2, pp. 138–151, 2020; https://doi.org/10.18255/1818-1015-2020-2-138-151) an inaccurate description of the algorithm CheckTrace is committed. The correct description of the algorithm CheckTrace is given below. The author apologises for the inconvenience.

Highlights

  • “On the Detection of Exploitation of Vulnerabilities Leading to the Execution of a Malicious Code”, Modeling and analysis of information systems, vol 27, no. 2, pp. 138–151, 2020

  • = not typical конец условия конец условия конец цикла возвратить

Read more

Summary

Introduction

MSC2020: 68M25 Research article Full text in Russian E correct description of the algorithm CheckTrace is given below.

Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.