• A
  • A
  • A
  • ABC
  • ABC
  • ABC
  • А
  • А
  • А
  • А
  • А
Regular version of the site

Development of Zero-Day Vulnerability Detection Methods

Student: Stoliarov Vladislav

Supervisor: Petr Baranov

Faculty: Graduate School of Business

Educational Programme: Information Security Management (Master)

Year of Graduation: 2018

Remote code execution as a result of exploiting various software vulnerabilities is one of the most effective ways to distribute malicious software. Exploits are often used in targeted attacks, to create and distribute botnets and worms, viruses, ransomware and trojans. Despite the fact that modern operating systems constantly apply and improve technology to prevent the exploitation of entire classes of such vulnerabilities, their number increases every year. In this paper, the problem of detecting malicious software exploiting the "memory corruption" vulnerabilities for performing malicious activity and further distribution is considered.

Student Theses at HSE must be completed in accordance with the University Rules and regulations specified by each educational programme.

Summaries of all theses must be published and made freely available on the HSE website.

The full text of a thesis can be published in open access on the HSE website only if the authoring student (copyright holder) agrees, or, if the thesis was written by a team of students, if all the co-authors (copyright holders) agree. After a thesis is published on the HSE website, it obtains the status of an online publication.

Student theses are objects of copyright and their use is subject to limitations in accordance with the Russian Federation’s law on intellectual property.

In the event that a thesis is quoted or otherwise used, reference to the author’s name and the source of quotation is required.

Search all student theses