| News | Staff | Projects | Awards | Patents | Results | Conferences | Collaboration | Publications | Events | Matherials | Links |
 | Contacts |
rus | eng |
  


Personal | Interests | Projects | Publications | 

Desnitsky Vasily Alexeevich

Citizenship: Russia
Address academic (office):
St.Petersburg Institute for Informatics and Automation of the Russian Academy of Sciences
39, 14th Liniya, St.-Petersburg, 199178, Russia
Tel.: +7-(812)-328-2642
Fax: +7-(812)-328-4450

Position:Senior research fellow

Vasily Alekseevich Desnitsky, Master of Computer Science, Senior research fellow of Laboratory of Computer Security Problems of the St. Petersburg Institute for Informatics and Automation of the Russian Academy of Science (Scientific advisor - prof. Igor Kotenko), graduated from Mathematics and Mechanics Department of St. Petersburg State University in 2006.

E-mail: desnitsky[AT]comsec[DOT]spb[DOT]ru
http://comsec.spb.ru/desnitsky/

Top 

Research interests

Anti-tamper Techniques, Security Policies, Object-Oriented Patterns, Java2 EE platform

Top 

Awards

2015

  • Desnitsky Vasily Alexeevich - Winner of the St. Petersburg competitive selection for young scientists and PhD.

2014

  • Desnitsky Vasily Alexeevich - Winner of the St. Petersburg competitive selection for young scientists and PhD.

2011

  • Desnitsky Vasily Alexeevich - Winner of the St. Petersburg competitive selection for young scientists and PhD.

Top 

Patents and Programms

Programs and databases

2016

  1. .., .., .. . 2016663475. 08.12.2016.
  2. .. . 2016663374. 06.12.2016.
  3. .., .. . 2016663477. 08.12.2016.

2015

  1. Vasily Desnitsky, Igor Kotenko. Component for gathering data on a system for design, verification and testing security components of information and telecommunication Internet of Things systems. Certificate No 2015615411. Registered in the Computer Program Registry 18.05.2015.

  2. Vasily Desnitsky, Igor Kotenko. A software tool for evaluation of effectiveness of configuring security components of Internet of Things systems. Certificate N 2015662025. Registered in the Computer Program Registry 16.11.2015.

  3. Vasily Desnitsky. The software of representing the input data for configuring components of protection of embedded devices. Certificate 2015662185. Registered in the Computer Program Registry 18.11.2015.

  4. Vasily Desnitsky. Generator of report forms of analysis of security systems of the Internet of things. Certificate 2015662184. Registered in the Computer Program Registry 18.11.2015.

2014

  1. Vasily Desnitsky, Igor Kotenko. Verificataion of network information flows for protection of information and telecommunication systems with embedded devices. Federal Service for Intellectual Property. Certificate No 2014661027. Registered in the Computer Program Registry 22.10.2014.

2013

  1. Igor Kotenko, Vasily Desnitsky. Configurator of protection system of embedded devices. Federal Service for Intellectual Property. Certificate No 2013612691. Registered in the Computer Program Registry 11.03.2013 .

Top 

Projects

Current Grants and Projects

Former Projects

  • Vasiliy Desnitsky (Principal Investigator). Development and investigation of models and techniques for design and verification of combined protection mechanisms for information and telecommunication systems with embedded devices on the base of expert knowledge. Research grant # 14-07-00417-a of Russian Foundation of Basic Research, 2014-2016 (Principal Investigator).
    Report-2014-14-07-00417-a-short.pdf [application/pdf] (258333 bytes)
    Report-2015-14-07-00417-a-short.pdf [application/pdf] (516620 bytes)
    Report-2016-14-07-00417-a-short.pdf [application/pdf] (740843 bytes)
  • Igor Kotenko (Principal Investigator) State Contract No. 14.604.21.0137 "Development of the technologies of the interactive visualization of the unformalized heterogeneous data for decision support systems in scope of the information security monitoring and management in the information and telecommunication systems". Project of Russian Ministry of Education and Science in scope of the Program "Research and development in priority directions of evolution of the scientific and technological complex of Russia on 2014-2020", 2014-2016., 2014-2016 (Researcher).
    14.604.21.0137_current_status.pdf [application/pdf] (138103 bytes)
  • Igor Kotenko (Principal Investigator) State Contract No. 14.604.21.0147 "Development of the methods for aggregation, normalization, analysis and visualization of big arrays of the heterogeneous, structured, semi-structured and unstructured data for the security monitoring and management of the distributed network of the electronic consumer devices". Project of Russian Ministry of Education and Science in scope of the Program "Research and development in priority directions of evolution of the scientific and technological complex of Russia on 2014-2020", 2014-2016., 2014-2016 (Researcher).
    14.604.21.0147_current_status.pdf [application/pdf] (142791 bytes)
  • Igor Kotenko (Principal Investigator). State Contract No. 14.604.21.0033 Models, methods and software for development and analysis of information-telecommunication system security components for Internet of Things concept. Project of Russian Ministry of Education and Science in scope of the Program "Research and development in priority directions of evolution of the scientific and technological complex of Russia on 2014-2020", 2014-2015., 2014-2015 (Researcher).
    14.604.21.0033_current_status [application/pdf] (262992 bytes)
  • Igor Kotenko (Principal Investigator) State Contract No. 14.616.21.0028 "Perspective methods of correlation of the security information and incidents management information in the critical infrastructures on the base of the convergence of the technologies of the security awareness on the physical and logical levels". Project of Russian Ministry of Education and Science in scope of the Program "Research and development in priority directions of evolution of the scientific and technological complex of Russia on 2014-2020", 2014., 2014-2014 (Researcher).
  • Igor Kotenko (Principal Investigator). Mathematical models and methods for monitoring and management of information security in computer networks and systems of critical infrastructures based on intelligent services of information protection. Research grant # 13-01-00843-a of Russian Foundation of Basic Research, 2013-2015 (Researcher).
    Report-2013-13-01-00843-a-short.pdf [application/pdf] (294747 bytes)
    Report-2014-13-01-00843-a-short.pdf [application/pdf] (761856 bytes)
    Report-2015-13-01-00843-a-short.pdf [application/pdf] (562916 bytes)
  • Igor Kotenko (Principal Investigator). Methods for the synthesis of the distributed intelligent system of information and technological security of automated control systems for railways. Research grant # 13-07-13159-ofi_m_RJD of Russian Foundation of Basic Research, 2013-2014 (Researcher).
  • Igor Kotenko (Principal Investigator). Mathematical models, methods and algorithms of attack modeling, computer systems and networks protection analysis, information security risk analysis and decision-making for selection of security mechanisms in computer systems and networks. Program "Architectural and software solutions, and security of data-processing supercomputer complexes of new generations" of the Russian Academy of Sciences Branch "Nanotechnologies and Information Technologies", 2012-2014 (Researcher).
  • Igor Kotenko (Principal Investigator). State Contract No. 11.519.11.4008 Research and development of methods, models and algorithms of intellectualizing the secirity services in critical infrastructures. Project of Russian Ministry of Education and Science, 2011-2013 (Researcher).
  • Igor Saenko (Principal Investigator). Mathematical models and methods of analysis and synthesis of access systems to information and network resources in modern and advanced computer systems and networks through the establishment and application of artificial intelligence. Research grant # 11-07-00435- of Russian Foundation of Basic Research, 2011-2013 (Researcher).
    Report-2011-11-07-00435-a-short.pdf [application/pdf] (287595 bytes)
    Report-2012-11-07-00435-a-short.pdf [application/pdf] (344443 bytes)
    Report-2013-11-07-00435-a-short.pdf [application/pdf] (317185 bytes)
  • Igor Kotenko (Principal Investigator). Mathematical models and methods of integrated protection against network attacks and malware in computer networks and systems based on hybrid multi-agent modeling and simulation of computer counteraction, verified adaptive security policies and proactive monitoring by data mining. Research grant # 10-01-00826-a of Russian Foundation of Basic Research, 2010-2013 (Researcher).
    Report-2010-10-01-00826-a-short.pdf [application/pdf] (191714 bytes)
    Report-2011-10-01-00826-a-short.pdf [application/pdf] (260794 bytes)
    Report-2012-10-01-00826-a-short.pdf [application/pdf] (348160 bytes)
  • Igor Kotenko (Principal Investigator from SPIIRAS). Design of Secure and energy-efficient embedded systems for Future internet applications (SecFutur). Research Project of the European Community seventh framework program (FP7). Contract No. 256668 (http://www.secfutur.eu/), 2010-2013 (Researcher).
  • Igor Kotenko (Principal Investigator from SPIIRAS). MAnagement of Security information and events in Service InFrastructures (MASSIF). Research Project of the European Community seventh framework program (FP7). Contract No. 257475 (http://www.massif-project.eu/), 2010-2013 (Researcher).
  • Igor Kotenko (Principal Investigator). Mathematical Models, Methods and Algorithms of Proactive Protection against Malware in Computer Networks and Systems. Program "Architecture, system solutions, software, standardization and information security of computer complexes of new generations" of the Russian Academy of Sciences Branch "Nanotechnologies and Information Technologies", 2009-2011 (Researcher).
  • Igor Kotenko (Principal Investigator). Project on demand of Section of Applied Problems of Russian Academy of Sciences. Governmental contract, 2008-2009 (Researcher).
  • Igor Kotenko (Principal InvestigatorModels and methods of construction and functioning support of intelligent adaptive security systems based on modeling and simulation of security systems behavior, realization of verified security policies, security evaluation and proactive monitoring. Research grant # 07-01-00547 of Russian Foundation of Basic Research, 2007-2009 (Researcher).
    Report-07-01-00547a-2007short.pdf [application/pdf] (193198 bytes)
    Report-07-01-00547a-2008short.pdf [application/pdf] (205945 bytes)
    Report-07-01-00547a-2009short.pdf [application/pdf] (943498 bytes)
  • Igor Kotenko (Principal Investigator from SPIIRAS). Remote EnTrusting by RUn-time Software authentication (RE-TRUST). Research Project of the European Community sixth framework program, 2006-2009 (Researcher).
  • Igor Kotenko (Principal Investigator). Automatic Detection and Response Techniques against Internet Worms. The subcontract with International Research Institute for Advanced Systems (IRIAS) according to contract with Hewlett-Packard, 2006-2007 (Researcher).
  • Igor Kotenko (Principal Investigator). Development of scientific-methodical bases of information protection in the communication channels of International collective ecological safety system. The state contract with the Center of security problems research of the Russian Academy of Sciences, 2006-2006 (Researcher).
  • Igor Kotenko (Principal Investigator). Modeling of information security processes in computer networks in adversarial environment: formal framework, mathematical models, multi-agent architecture, software prototype and experimental evaluation. Research grant 04-01-00167 of Russian Foundation of Basic Research, 2004-2006 (Researcher).
    Report-04-01-00167a-2006.pdf [application/pdf] (446259 bytes)
    Report-04-01-00167a.pdf [application/pdf] (510438 bytes)
  • Igor Kotenko (Principal Investigator). Mathematical Models of Active Analysis of Vulnerabilities, Intrusion Detection and Network Attacks Counteraction in Computer Networks based on Multi-agent Technologies. Program "Optimization of computer architectures to particular classes of tasks, information assurance of network technologies" of the Russian Academy of Sciences Branch "Nanotechnologies and Information Technologies"., 2003-2008 (Researcher).
  • Igor Kotenko (Principal Investigator from SPIIRAS). Policy-based Security Tools and Framework (POSITIF). Research Project of the European Community sixth framework program. Contract # IST-2002-002314, 2003-2007 (Researcher).

Top 

Main publications

Papers

2016

  1. Vasily Desnitsky, Andrey Chechulin, Igor Kotenko, Dmitry Levshun, Maxim Kolomeec. Application of a Technique for Secure Embedded Device Design Based on Combining Security Components for Creation of a Perimeter Protection System. 24th Euromicro International Conference on Parallel, Distributed, and Network-Based Processing (PDP 2016). Heraklion, Crete, Greece, February, 2016. IEEE Computer Society. 2016. P.609-616. (Scopus)
  2. Vasily Desnitsky, Dmitry Levshun, Andrey Chechulin and Igor Kotenko. Design Technique for Secure Embedded Devices: Application for Creation of Integrated Cyber-Physical Security System. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), Vol.7, No.2, June, 2016. P.60-80. http://jowua.yolasite.com/vol7no2.php (Scopus)
  3. Vasily Desnitsky and Igor Kotenko. Automated design, verification and testing of secure systems with embedded devices based on elicitation of expert knowledge // Journal of Ambient Intelligence and Humanized Computing (AHIC), Springer. October 2016, Volume 7, Issue 5, P.705719. DOI 10.1007/s12652-016-0371-6. http://link.springer.com/article/10.1007/s12652-016-0371-6 (WoS and Scopus)
  4. Vasily Desnitsky, Igor Kotenko. Event analysis for security incident management on a perimeter access control system // XIX International Conference on Soft Computing and Measurements (SCM'2016). IEEE Xplore, 2016. P.481-483. DOI: 10.1109/SCM.2016.7519819. (WoS and Scopus)
  5. Vasily Desnitsky, Andrey Chechulin, Igor Kotenko, Dmitry Levshun, Maxim Kolomeec. Combined Design Technique for Secure Embedded Devices Exemplified by a Perimeter Protection System. SPIIRAS Proceedings. 2016. Issue 48. P.5-31. (in Russian).
  6. Vasily Desnitsky, Igor Kotenko, Yan Kopchak. Analysis of events for management of security incidents on the example of access control system. XIX International Conference on Soft Computing and Measurements (SCM'2016),Proceedings, Vol. 2, Saint-Petersburg, ETU "LETI", 2016. P.332-336. (in Russian).
  7. Vasily Desnitsky. Detection of anomalous data from sensors embedded devices based on expert knowledge. 9th Conference on Information Technologies in Control (ITC) . Proceedings. St.Petersburg, Russia. October 46, 2016. P.676-679. (in Russian).
  8. Vasily Desnitsky. Implementation of software means for model checking based verification of network data flows. 9th Conference on Information Technologies in Control (ITC) . Proceedings. St.Petersburg, Russia. October 46, 2016. P.680-683. (in Russian).
  9. Vladislav Alexandrov, Vasily Desnitsky, Dmitry Chaly. Development and security analysis of a fragment of Internet of Things system. Modeling and Analysis of Information Systems. Volume 23, issue 26. 2016. P.767-776. (in Russian).
  10. Vasily Desnitsky, Dmitry Chaly. The client-server based approach to protection of Internet of things software systems. Technical sciences from theory to practice. 2016, 11 (59), Novosibirsk, SibAK, P.6-13. (in Russian).
  11. Vasily Desnitsky, Andrey Chechulin. Information flow verification technique for Internet of things systems. XV nniversary Saint-Petersburg International Conference "Regional informatics-2016 (RI-2016)". Proceedings. St. Petersburg, 2016. P.156-157. (in Russian).
  12. Vasily Desnitsky, Dmitry Levshun. The choice and combination of elements for the construction of an integrated system of cyber-physical security // 18th International Conference RusCrypto on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 22-25, 2016. http://www.ruscrypto.ru/ . (in Russian).
  13. Vasily Desnitsky. An approach to information flow verification of Internet of things systems. 25th All-Russian Conference Methods and technical tools of information security (MTTIS 2016). Proceedings. St.Petersburg, Russia. 4-7 July, 2016. P.34-35. (in Russian).
  14. Vasily Desnitsky. Detection of anomalous data from sensors in the information and telecommunication systems with embedded devices. International congress "IS&IT'16" - International Conference on Artificial Intelligence and Systems. Proceedings. Divnomorskoye, Russia. September 4-11. Taganrog, UFY, 2016. Vol.1. P.217-223. (in Russian).
  15. Vasily Desnitsky, Vladislav Alexandrov. An intruder model for information and telecommunication Internet of Things systems. XV nniversary Saint-Petersburg International Conference "Regional informatics-2016 (RI-2016)". Proceedings. St. Petersburg, 2016. P.155-156. (in Russian).

2015

  1. Vasily Desnitsky, Igor Kotenko, Sergey Nogin. Detection of Anomalies in Data for Monitoring of Security Components in the Internet of Things. XVIII International Conference on Soft Computing and Measurements (SCM'2015). IEEE Xplore, 2015. P.189-192. DOI: 10.1109/SCM.2015.7190452. (Scopus)
  2. Vasily Desnitsky, Igor Kotenko. Design and Verification of Protected Systems with Integrated Devices Based on Expert Knowledge. Automatic Control and Computer Sciences, Allerton Press, Inc., Vol. 49, No. 8, 2015. P.648652. (Scopus)
  3. Vasily Desnitsky, Elena Doynikova. Architecture and effectiveness evaluation of software tool for configuring security components of systems with embedded devices // Technical sciences from theory to practice, 47, 2015. P.9-13. (in Russian).
  4. Elena Doynikova, Vasily Desnitsky. Generator of the random attack sequences for the computer network on the base of the CAPEC attack patterns // Technical sciences from theory to practice, 46, 2015. P.11-16. (in Russian).
  5. Vasily Desnitsky, Igor Kotenko. Formation of the expertise to develop secure systems with embedded devices. Problems of information security, Computer systems, 4, 2015. P.35-41. (in Russian).
  6. Vasily Desnitsky. Configuring security components of embedded devices on the base of a heuristic approach. Technical sciences from theory to practice, 46, 2015. P.16-20. (in Russian).
  7. Vasily Desnitsky. A technique for evaluation resource consumption of security components for systems with embedded devices. Technical sciences from theory to practice, 47, 2015. P.14-18. (in Russian).
  8. Vasily Desnitsky. Models of the development process for combined protection mechanisms for information and telecommunication systems with embedded devices. International congress "IS&IT15" - International Conference on Artificial Intelligence and Systems. Proceedings. Divnomorskoye, Black Sea Coast, Russia. September 2-9. Moskow, Fizmathlit, 2015. Vol. 2. P.113-118. (in Russian).
  9. Vasily Desnitsky. A model of a configuration of embedded device security components. IX Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2015)", Saint-Petersburg, October 28-30, 2015. The proceedings of conference, 2015. P.65-66. (in Russian).
  10. Vasily Desnitsky. A technique for evaluation of embedded device security components. // IX Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2015)", Saint-Petersburg, October 28-30, 2015. The proceedings of conference, 2015. P.66-67. (in Russian).
  11. Vladislav Aleksandrov, Vasily Desnitsky, Sergey Bushuev. Development and analysis if a fragment of a secure Internet of Things system IX Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2015)", Saint-Petersburg, October 28-30, 2015. The proceedings of conference, 2015. P.56-57. (in Russian).
  12. Vasily Desnitsky, Igor Kotenko, Sergey Nogin. Detecting anomalies in the data for monitoring protection components of the Internet of things. XVIII International Conference on Soft Computing and Measurements (SCM'2015),Proceedings. Vol. 2, Saint-Petersburg, ETU "LETI", 2015. P.17-22. (in Russian).
  13. Sergey Bushuev, Vasily Desnitsky. Formation of expertise for the development of secure systems, "Internet of Things". 17th International Conference RusCrypto`2015, Solnechnogorsk, March 17-20, 2015. http://www.ruscrypto.ru/ (in Russian).
  14. Vasily Desnitsky. A technique for evaluation resource consumption of security components of information and telecommunication systems with embedded devices. 24th All-Russian Conference Methods and technical tools of information security (MTTIS 2015). Proceedings. St.Petersburg, Russia. 29 June - 02 July, 2015. P.69-70. (in Russian).
  15. Vasily Desnitsky. A technique for revelation of functional and non-functional incompatibilities of security components of embedded devices of information and telecommunication systems. 24th All-Russian Conference Methods and technical tools of information security (MTTIS 2015). Proceedings. St.Petersburg, Russia. 29 June - 02 July, 2015. P.70-71. (in Russian).

2014

  1. Vasily Desnitsky, Andrey Chechulin. Generalized intruder model and verification of information systems with embedded devices. Technical sciences from theory to practice. 2014, 39, Novosibirsk, SibAK, P.7-21. (in Russian).
  2. Andrey Chechulin, Igor Kotenko, Vasily Desnitsky. Features of the information security systems design in cyber-physical systems. 23th All-Russian Conference Methods and technical tools of information security (MTTIS 2014). Proceedings. St.Petersburg, Russia. 30 June - 03 July, 2014. P.67-69. (in Russian).
  3. Vasily Desnitsky, Andrey Chechulin. Verification of information and telecommunication systemms with embedded devices on the base of generalized intuder model. 23th All-Russian Conference Methods and technical tools of information security (MTTIS 2014). Proceedings. St.Petersburg, Russia. 30 June - 03 July, 2014. P.66-67. (in Russian).
  4. Vasily Desnitsky, Igor Kotenko. Expert Knowledge based Design and Verification of Secure Systems with Embedded Devices // 4rd IFIP International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD 2014). September 8nd 12th, 2014. Fribourg, Switzerland. Lecture Notes in Computer Science (LNCS), Vol.8708. Springer-Verlag. 2014. P.194-210. (WoS, Scopus)
  5. Vasily Desnitsky, Igor Kotenko. Design and verification of secure systems with embedded devices on the base of expert knowledge Problems of information security. Computer systems. 3, 2014. P.16-22. (in Russian).
  6. Vasily Desnitsky, Igor Kotenko. The use of expert knowledge in development of secure systems with embedded devices. Information Technologies and Computing Systems, 4, 2014, P.58-73. (in Russian).
  7. Vasily Desnitsky. Verification of network information flows for the systems with embedded devices on the base of expert knowledge. 7th Russian Multiconference on Problems in Control (MPC). Conference on Information Technologies in Control (ITC).Proceedings. St.Petersburg, Russia. October 79, 2014. P.596-600. (in Russian).
  8. Vasily Desnitsky. Conceptual combined model of the protection system of embedded devices. Innovations in the science. 2014. Novosibirsk, SibAK, 38, .55-59. ISSN: 2308-6009. (in Russian).
  9. Vasily Desnitsky. Development of knowledge model for design and secure embedded devices. Natural and mathematical science in the modern world. 2014, 23, P.35-40. (in Russian).
  10. Vasily Desnitsky. Design and verification of security mechanisms for systems with embedded devices on the base of expert knowledge. 16th Conference RusCrypto on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 25-28, 2014. http://www.ruscrypto.ru/ (in Russian).
  11. Vasily Desnitsky, Elena Doynikova. Development of the defence components for the embedded devices considering expert knowledge // International science and practical conference "Theoretical and applied problems of the information security". June 19, 2014, Minsk, Police Academy, the Republic of Belarus, 2014. (in Russian).
  12. Vasily Desnitsky, Igor Kotenko. Configuring information systems with embedded devices to provide complex security on railway transport. 23th All-Russian Conference Methods and technical tools of information security (MTTIS 2014). Proceedings. St.Petersburg, Russia. 30 June - 03 July, 2014. P.89-90. (in Russian).
  13. Vasily Desnitsky, Igor Kotenko. Combined protection model of information and telecommunication systems of Internet of Things concept. 23th All-Russian Conference Methods and technical tools of information security (MTTIS 2014). Proceedings. St.Petersburg, Russia. 30 June - 03 July, 2014. P.65-66. (in Russian).
  14. Vasily Desnitsky. Analysis of perspective systems with embedded devices to form expert knowledge in the field of design secure information and telecommunication systems. XIV Saint-Petersburg International Conference Regional informatics-2014 (RI-2014). Proceedings. St. Petersburg, 2014. P.130. (in Russian).
  15. Vasily Desnitsky, Igor Kotenko. Conceptual combined model of embedded device protection system and its application to configuring components of multi-level intellectual system of complex security on railway transport. XIV Saint-Petersburg International Conference Regional informatics-2014 (RI-2014). Proceedings. St. Petersburg, 2014. P.131. (in Russian).

2013

  1. Vasily Desnitsky, Igor Kotenko. Configuring embedded information protection systems within services providing complex security on rail transport. Proceedings of SPIIRAS. Issue 7 (30). St.Petersburg, Nauka, 2013. P.40-55. (in Russian).
  2. Vasily Desnitsky. A technique for verification of network information flows in information and telecommunication systems with embedded devices. Proceedings of SPIIRAS. Issue 7 (30). St.Petersburg, Nauka, 2013. P.246-257. (in Russian).
  3. Vasily Desnitsky, Igor Kotenko. Configuration based design of security embedded devices. Problems of information security. Computer systems. 1, 2013, P.44-54. (in Russian).
  4. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Information flow verification for design of protected information systems with embedded devices. High availability systems, 3 (9), 2013. P.112-118. (in Russian).
  5. Vasily Desnitsky. Configuration based combined protection of embedded devices. Innovations in Science. 16-1, 2013. Novosibirsk: pub. "SibAK". P.64-67. (in Russian).
  6. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Design of secure information systems with embedded devices. 15th Conference RusCrypto. Solnechnogorsk, Russia. March 28-30, 2013. http://www.ruscrypto.ru/ (in Russian).
  7. Vasily Desnitsky. Verification of information flows in process of development secure systems with embedded devices. 22th All-Russian Conference Methods and technical tools of information security(MTTIS 2013). Proceedings. St.Petersburg, Russia. July 08-11, 2013. P.17-18. (in Russian).
  8. Vasily Desnitsky, Igor Kotenko. Configuring embedded information protection systems within services of multi-level intelligent system of rail transport complex security. VIII Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2013)", Saint-Petersburg, October 23-25, 2013. The proceedings of conference, 2013. P.91-92. (in Russian).
  9. Vasily Desnitsky. Information flow verification in systems with embedded devices. VIII Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2013)", Saint-Petersburg, October 23-25, 2013. The proceedings of conference, 2013. P.92-93. (in Russian).
  10. Vasily Desnitsky. A technique for configuring secure embedded devices. VIII Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2013)", Saint-Petersburg, October 23-25, 2013. The proceedings of conference, 2013. P.93-94. (in Russian).

2012

  1. Jose Fran. Ruiz, Vasily Desnitsky, Rajesh Harjani, Antonio Manna, Igor Kotenko and Andrey Chechulin. A Methodology for the Analysis and Modeling of Security Threats and Attacks for Systems of Embedded Components. Proceeding of the 20th International Euromicro Conference on Parallel, Distributed and Network-based Processing (PDP 2012). Garching/Munich, February, 2012. P.261-268. (Scopus)
  2. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Configuration-based approach to embedded device security. Lecture Notes in Computer Science, Springer-Verlag. The Sixth International Conference "Mathematical Methods, Models and Architectures for Computer Networks Security" (MMM-ACNS-2012). October 17-19, 2012, St. Petersburg, Russia. P.270-285. (Scopus)
  3. Andrey Chechulin, Igor Kotenko, Vasily Desnitsky. An Approach for Network Information Flow Analysis for Systems of Embedded Components. Lecture Notes in Computer Science, Springer-Verlag. The Sixth International Conference "Mathematical Methods, Models and Architectures for Computer Networks Security" (MMM-ACNS-2012). October 17-19, 2012, St. Petersburg, Russia. P.146-155. (Scopus)
  4. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Configuration of secure systems with embedded and mobile devices. Issues of information Protection,2, 2012. P.20-28. (in Russian).
  5. Andrey Chechulin, Igor Kotenko, Vasily Desnitsky. Information flow analysis for development of secure systems with embedded devices. High availability systems, 2, 2012. P.116-122. (in Russian).
  6. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Configuring components of combined protection of embedded devices on the basis of solving optimality task. High availability systems, 2, 2012. P.50-56. (in Russian).
  7. Vasily Desnitsky, Igor Kotenko. A model for configuring protected and energy-efficient embedded systems. Journal of Instrument Engineering, Vol.55, 11, 2012. P.5257. ISSN 0021-3454. (in Russian).
  8. Vasily Desnitsky. Configuration model for combined protection of information systems with embedded devices. VII Saint-Petersburg Interregional conference "Information security of regions of Russia (IBRR-2011)", Saint-Petersburg. The proceedings of conference, 2012. P.77-83. (in Russian).
  9. Jose Fran. Ruiz, Vasily Desnitsky. Design of protected telecommunication systems with embedded devices. 14th Conference RusCrypto'2012. Solnechnogorsk, Russia. March 28-30, 2012. http://www.ruscrypto.ru/ (in Russian).
  10. Vasily Desnitsky, Igor Kotenko. Configuring information and telecommunication systems with embedded devices. 21th All-Russian Conference Methods and technical tools of information security(MTTIS 2012). Proceedings. St.Petersburg, Russia. June 24-29, 2012.P.14-17. (in Russian).
  11. Andrey Chechulin, Vasily Desnitsky, Igor Kotenko. Information flow analysis for development of secure systems with embedded devices. 21th All-Russian Conference "Methods and technical tools of information security" (MTTIS 2012). Proceedings. St.Petersburg, Russia. June 24-29, 2012. P.35-37. (in Russian).
  12. Vasily Desnitsky, Andrey Chechulin. Analysis of incompatibilities between security components in design process of secure embedded devices. 21th All-Russian Conference "Methods and technical tools of information security" (MTTIS 2012). Proceedings. St.Petersburg, Russia. June 24-29, 2012. P.17-19. (in Russian).
  13. Vasily Desnitsky. Modeling of non-functional protection properties in the process of configuration of secure embedded devices. 21th ll-Russian Conference "Methods and technical tools of information security" (MTTIS 2012). Proceedings. St.Petersburg, Russia. June 24-29, 2012. P.12-14. (in Russian).
  14. Vasily Desnitsky. Configuring combined protection components for embedded system protection on the base of solving optimality task. International congress IS&IT - International Conference on Artificial Intelligence and Systems. Proceedings. Divnomorskoye, Black Sea Coast, Russia. September 2-9. Moskow, Fizmathlit, 2012. Vol. 2. P.383-384. (in Russian).
  15. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Design of secure embedded systems in European Union project SecFutur. 5th Russian Multiconference on Problems in Control (MPC). Conference on Information Technologies in Control (ITC).Proceedings. St.Petersburg, Russia. October 911, 2012. P.699-708. (in Russian).
  16. Vasily Desnitsky. Analysis of approaches to development of anytime algorithms to solve computationally complex problems. XIII Saint-Petersburg International Conference Regional informatics-2012 (RI-2012). Proceedings. St. Petersburg, 2012. P.90. (in Russian).
  17. Vasily Desnitsky. Configuring secure embedded devices on the base of non-functional protection properties. XIII Saint-Petersburg International Conference Regional informatics-2012 (RI-2012). Proceedings. St. Petersburg, 2012. P.91. (in Russian).
  18. Vasily Desnitsky, Andrey Chechulin. Analysis of incompatibilities of security components in embedded devices. XIII Saint-Petersburg International Conference Regional informatics-2012 (RI-2012). Proceedings. St. Petersburg, 2012. P.93. (in Russian).
  19. Vasily Desnitsky, Andrey Chechulin, Igor Kotenko. Using anytime algorithms of attack modeling and security evaluation in SIEM systems. XIII Saint-Petersburg International Conference Regional informatics-2012 (RI-2012). Proceedings. St. Petersburg, 2012. P. 92. (in Russian).
  20. Andrey Chechulin, Vasily Desnitsky. Information flow analysis in the task of embedded system analysis. XIII Saint-Petersburg International Conference Regional informatics-2012 (RI-2012). Proceedings. St. Petersburg, 2012. P.129. (in Russian).
  21. Vasily Desnitsky. Development of model and software tool for configuring and security control in corporative distributed information systems with embedded and mobile devices. XVII St. Petersburg assembly of young scientists and specialists. Proceedings. October 12, 2012. P.195. (in Russian).

2011

  1. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. An abstract model for embedded systems and intruders. Proceedings of the Work in Progress Session held in connection with the 19th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2011). Ayia Napa, Cyprus, February 2011. SEA-Publications. SEA-SR-29. 2011. P.25-26. ISBN 978-3-902457-29-5.
  2. Vasily Desnitsky, Andrey Chechulin. Model of the process for secure embedded systems development. High availability systems, 2, 2011. P.97-101. (in Russian).
  3. Igor Kotenko, Vasily Desnitsky, Andrey Chechulin. Investigation of technologies for secure embedded systems design in European Union project SecFutur. Information Security. Inside, 3, 2011. P.68-75. (in Russian).
  4. Vasily Desnitsky. Configuring embedded and mobile devices based on optimality problem solving. Proceedings of SPIIRAS. Issue 4 (19). St.Petersburg, Nauka, 2011. (in Russian).
  5. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Constructing and testing secure embedded systems. XII Saint-Petersburg International Conference Regional informatics-2010 (RI-2010). Selected Proceedings. St. Petersburg, 2011. P.115-121. (in Russian).
  6. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Abstract model for embedded secure systems. The Nineth All-Russian Scientific Conference "Mathematics and Security of Information Technologies" (MSIT-10). Moscow, 2011. (in Russian).
  7. Andrey Chechulin, Vasily Desnitsky. Intruder model for provision of embedded systems security. The Nineth All-Russian Scientific Conference "Mathematics and Security of Information Technologies" (MSIT-10). Moscow, 2011. (in Russian).
  8. Vasily Desnitsky, Andrey Chechulin. Unification of a process of secure embedded systems construction. 13th Conference RusCrypto on Cryptology, Steganography, Digital Signature and Security Systems. Solnechnogorsk, Russia. March 30 - April 2, 2011. http://www.ruscrypto.ru/ (in Russian).
  9. Vasily Desnitsky. The model of a unified process for development of secure embedded systems. 20th All-Russian Conference Methods and technical tools of information security (MTTIS 2011). Proceedings. St.Petersburg, Russia. June 27 - July 01, 2011. P.15-16. (in Russian).
  10. Vasily Desnitsky, Igor Kotenko, Andrey Chechulin. Configuration model for combined protection of information systems with embedded devices. VII St.Petersburg Interregional Conference Information Security of Russian Regions (IBRR-2011). October 26-28, 2011. Proceedings. St.Petersburg, 2011. P.69-70. (in Russian).
  11. Vasily Desnitsky. Configuring effectiveness evaluation for combined protection mechanisms on the basis of optimality problem solving. VII St.Petersburg Interregional Conference Information Security of Russian Regions (IBRR-2011). October 26-28, 2011. Proceedings. St.Petersburg, 2011. P.69. (in Russian).

2010

  1. Vasily Desnitsky,Igor Kotenko. Combined software protection against unauthorized ifluences. Journal of Instrument Engineering, Vol.53, 11, 2010, P.36-41. ISSN 0021-3454. (in Russian).
  2. V.Desnitsky, I.Kotenko. Protectability and scalability of software protection mechanism based on remote entrusting principles. Risks and security management. Proceedings of Institute of System Analysis of Russian Academy of Science. Moscow, 2010. (in Russian).
  3. Vasily Desnitsky, Igor Kotenko. Security and Scalability of Remote Entrusting Protection. Lecture Notes in Computer Science, Springer-Verlag, Vol. 6258. The Fifth International Conference "Mathematical Methods, Models and Architectures for Computer Networks Security" (MMM-ACNS-2010). September 8-10, 2010, St. Petersburg, Russia. P.298-306. ISSN 0302-9743.
  4. Vasiliy Desnitsky, Igor Kotenko. Development and analysis of remote entrusting protocol. VI St.Petersburg Interregional Conference Information Security of Russian Regions (IRR-2009). October 28-30, 2009. Proceedings. St.Petersburg, 2010. P.121-129. ISBN 978-5-904031-95-4. (in Russian).
  5. Vasily Desnitsky, Igor Kotenko. Software protection based on the principle of remote entrusting. 5th International Scientific Conference on Security Issues and Counter Terrorism. Lomonosov Moscow State University. October 29-30, 2009. Vol.2. The Eighth All-Russian Scientific Conference "Mathematics and Security of Information Technologies" (MSIT-09). Moscow, 2010. P.159-163. ISBN 978-5-94057-693-8. (in Russian).
  6. Vasiliy Desnitsky, Igor Kotenko. Combined mechanisms to protect software from unauthorized modifications. IX All-Russian Conference Methods and technical tools of information security (MTTIS 2010). Proceedings. St.Petersburg, Russia. July 5-10, 2010. P.100-101. (in Russian).
  7. VasilyDesnitsky. Technique of finding the optimum combination of protection methods to protect software from interventions. IX All-Russian Conference Methods and technical tools of information security (MTTIS 2010). Proceedings. St.Petersburg, Russia. July 5-10, 2010. P.9-10. (in Russian).
  8. Vasiliy Desnitsky, Andrey Chechulin, Igor Kotenko. Configuration model of embedded devices. XII Saint-Petersburg International Conference Regional informatics-2010 (RI-2010). Proceedings. St. Petersburg, October 20-22, 2010. P.41-42. ISBN 978-5-904031-99-2. (in Russian).
  9. Vasiliy Desnitsky, Andrey Chechulin. Abstract model of embedded devices. XII Saint-Petersburg International Conference Regional informatics-2010 (RI-2010). Proceedings. St. Petersburg, October 20-22, 2010. P.40-41. ISBN 978-5-904031-99-2. (in Russian).
  10. Andrey Chechulin, Vasily Desnitsky, Mikhail Stepashkin. Intruder model in the task of security assurance of embedded system. XII Saint-Petersburg International Conference Regional informatics-2010 (RI-2010). Proceedings. St. Petersburg, October 20-22, 2010. P.150. ISBN 978-5-904031-99-2. (in Russian).
  11. Igor Kotenko, Vasily Desnitsky. An Aspect-oriented Approach to Realization of Mobile Module in the Security Model based on Remote Entrusting Mechanism. Information Technologies and Computing Systems, 4, 2009. P.67-76. (in Russian).

2009

  1. Vasily Desnitsky, Igor Kotenko. Analysis and Design of Entrusting Protocol for Distributed Software Protection. Proceedings of the Work in Progress Session heldin connection with the 17th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2009). Weimar, Germany. February 2009. SEA-Publications: SEA-SR-21. 2009. P.8-9.
  2. Vasily Desnitsky, Igor Kotenko. Design and Analysis of Remote Entrusting Protocol. The 4th International Scientific Conference on Security Issues and Counter Terrorism. The Seventh All-Russian Scientific Conference "Mathematics and Security of Information Technologies" (MSIT-08). 2009. (in Russian).
  3. Vasily Desnitsky, Igor Kotenko. Design of Entrusting Protocols for Software Protection. Fourth International Workshop Information Fusion and Geographical Information Systems (IF&GIS09). St.Petersburg, Russia, May 17-20, 2009. Lecture Notes in Geoinformation and Cartography. Springer. 2009.
  4. Vasily Desnitsky, Igor Kotenko. Approach to Software Protection based on Remote Entrusting Mechanism. 11th Conference RusCrypto on Cryptology, Steganography, Digital Signature and Security Systems. Zvenigorod, Russia. April 2-5, 2009. http://www.ruscrypto.ru/. (in Russian).
  5. Vasily Desnitsky. Configutation of software protection mechanism by means of security policies. VI St.Petersburg Interregional Conference Information Security of Russian Regions (ISRR-2009). October 28-30, 2009. Proceedings. St.Petersburg, 2009. P.97-98. (in Russian).
  6. Vasily Desnitsky. Scalability and security of protection mechanism on the basis of the remote entrusting principle. VI St.Petersburg Interregional Conference Information Security of Russian Regions (ISRR-2009). October 28-30, 2009. Proceedings. St.Petersburg, 2009. P.98. (in Russian).
  7. Vasily Desnitsky, Igor Kotenko. Performance and Scalability of Remote Entrusting Protection. Second International Workshop on Remote Entrusting (RE-TRUST 2009). September 30 - October 1, 2009. Riva del Garda, Italy, 2009.

2008

  1. Vasily Desnitsky, Igor Kotenko. Model of Software Protection based on Remote Retrusting Mechanism. V Interregional Conference Information Security of Russian Regions (ISRR-2007). Selected Proceedings. St.Petersburg, 2008. P.172-177. (in Russian).
  2. Igor Kotenko, Vasily Desnitsky. Aspect-oriented Approach to Realization of Mobile Module in Remote Retrusting Protection Model. Information Technologies and Computing Systems, No.2, 2008. (in Russian).
  3. Vasily Desnitsky, Igor Kotenko. Model of Software Protection based on Remote Entrusting Mechanism. News of High schools. Journal of Instrument Engineering, Vol.51, 11, 2008. P.26-30. ISSN 0021-3454. (in Russian).
  4. Vasily Desnitsky, Igor Kotenko, Sergey Reznik. Design and Verification of message exchange protocol for software protection based on Remote Entrusting mechanism. Information Security. Inside, No.4, 2008. P.59-63; No.5, 2008. P.68-74. (in Russian).
  5. Vasily Desnitsky, Igor Kotenko, Sergey Reznik. Design and Analysis of message exchange protocol for software protection based on Remote Entrusting. VII All-Russian Conference Methods and technical tools of information security (MTTIS 2008). Proceedings. St.Petersburg, Russia. June 27-29, 2008. (in Russian).
  6. Vasily Desnitsky, Igor Kotenko, Sergey Reznik. Design and Analysis of message exchange protocol for Remote Entrusting mechanism. International Conferences Intelligent systems (AIS 2008) and Intelligent CAD (CAD-2008). Proceedings. Divnomorskoe, Russia. September 3-10, 2008. Moscow, Fizmatlit, 2008. (in Russian).
  7. Vasily Desnitsky. Design and Analysis of Protocol for Protecting the Programs against Malicious Modifications. XI International Conference Regional informatics-2008 (RI-2008). Proceedings. St. Petersburg, October 21-23, 2008. P.98-99. (in Russian).

2007

  1. Vasily Desnitsky, Igor Kotenko. Models of Remote Authentication for Software Protection. International Conferences Intelligent systems (AIS'07) and Intelligent CAD (CAD-2007). Proceedings.Moscow, Fizmatlit, 2007. P.43-50. (in Russian).
  2. Vasily Desnitsky, Igor Kotenko. Remote Authentication for Protection of Programs against Non-authorized Modification. Scientific-practical Symposium National Information Systems and State Security. Proceedings. Moscow, Russia. September 2007. P.81-84. (in Russian).
  3. Vasily Desnitsky, Igor Kotenko. Model of Protecting the Programs against Non-authorized Changes on the Basis of Remote Trust Mechanism. V St.Petersburg Interregional Conference Information Security of Russian Regions (ISRR-2007). St.Petersburg, Russia. October 23-25, 2007. Conference Proceedings. St.Petersburg, 2007. P.81. (in Russian).
  4. Vasily Desnitsky. Remote Authentication as the Mechanism of Software Protection on Remote Clients. VI All-Russian Conference Methods and technical tools of information security (MTTIS 2007). June 27-29, 2007. St. Petersburg, Proceedings. SPbSPU. 2007. P.5. (in Russian).
  5. Vasily Desnitsky. Aspect-oriented Approach to Mobile Module Realization in Software Protection System. Scientific-practical Symposium National Information Systems and State Security. Proceedings. Moscow, Russia. September 2007. P.87-89. (in Russian).
  6. Vasily Desnitsky. Realization of Mobile Module Replacement Mechanism on the Basis of Aspect-oriented Programming Paradigm. V St.Petersburg Interregional Conference Information Security of Russian Regions (ISRR-2007). St.Petersburg, Russia. October 23-25, 2007. Conference Proceedings. St.Petersburg, 2007. P.49-50. (in Russian).

2006

  1. Vasily Desnitsky, Igor Kotenko. Protection of the software against breaking: the analysis of methods. St.Petersburg International Conference "Regional Informatics-2006" (RI-2006). Proceedings. St. Petersburg, October 24-26, 2006. P.108-109. (in Russian).

Top 

RUSSIA, 199178, Saint-Petersburg, liniya 14-ya, 39, SPIIRAS (metro station Vasileostrovskaya).
+7-(812)-328-7181, +7-(812)-328-2642, ivkote[AT]comsec[DOT]spb[DOT]ru

Comments? Questions? chechulin[AT]comsec[DOT]spb[DOT]ru

Locations of visitors to this page