<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.3 20210610//EN" "JATS-journalpublishing1-3.dtd">
<article article-type="research-article" dtd-version="1.3" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xml:lang="ru"><front><journal-meta><journal-id journal-id-type="publisher-id">trudyniisi</journal-id><journal-title-group><journal-title xml:lang="ru">Труды НИИСИ</journal-title><trans-title-group xml:lang="en"><trans-title>SRISA Proceedings</trans-title></trans-title-group></journal-title-group><issn pub-type="ppub">2225-7349</issn><issn pub-type="epub">3033-6422</issn><publisher><publisher-name>НИЦ «КУРЧАТОВСКИЙ ИНСТИТУТ» - НИИСИ</publisher-name></publisher></journal-meta><article-meta><article-id custom-type="elpub" pub-id-type="custom">trudyniisi-54</article-id><article-categories><subj-group subj-group-type="heading"><subject>Research Article</subject></subj-group><subj-group subj-group-type="section-heading" xml:lang="ru"><subject>ИНФОРМАЦИОННАЯ БЕЗОПАСНОСТЬ</subject></subj-group><subj-group subj-group-type="section-heading" xml:lang="en"><subject>INFORMATION SECURITY</subject></subj-group></article-categories><title-group><article-title>Использование аппаратных средств профилирования для обеспечения информационной безопасности критически важных систем</article-title><trans-title-group xml:lang="en"><trans-title>Using Hardware Performance Counters to Ensure Information Security of Critical Systems</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author" corresp="yes"><name-alternatives><name name-style="eastern" xml:lang="ru"><surname>Галатенко</surname><given-names>В. А.</given-names></name><name name-style="western" xml:lang="en"><surname>Galatenko</surname><given-names>V.</given-names></name></name-alternatives><bio xml:lang="ru"><p>Москва</p></bio><bio xml:lang="en"><p>Vladimir Galatenko</p></bio><email xlink:type="simple">galat@niisi.ras.ru</email><xref ref-type="aff" rid="aff-1"/></contrib><contrib contrib-type="author" corresp="yes"><name-alternatives><name name-style="eastern" xml:lang="ru"><surname>Костюхин</surname><given-names>К. А.</given-names></name><name name-style="western" xml:lang="en"><surname>Kostiukhin</surname><given-names>K.</given-names></name></name-alternatives><bio xml:lang="ru"><p>Москва</p></bio><bio xml:lang="en"><p>Konstantin Kostiukhin</p></bio><email xlink:type="simple">kost@niisi.ras.ru</email><xref ref-type="aff" rid="aff-1"/></contrib></contrib-group><aff-alternatives id="aff-1"><aff xml:lang="ru">Федеральное государственное учреждение «Федеральный научный центр Научно-исследовательский институт системных исследований Российской академии наук»<country>Россия</country></aff></aff-alternatives><pub-date pub-type="collection"><year>2023</year></pub-date><pub-date pub-type="epub"><day>21</day><month>10</month><year>2025</year></pub-date><volume>13</volume><issue>4</issue><fpage>29</fpage><lpage>33</lpage><permissions><copyright-statement>Copyright &amp;#x00A9; Галатенко В.А., Костюхин К.А., 2025</copyright-statement><copyright-year>2025</copyright-year><copyright-holder xml:lang="ru">Галатенко В.А., Костюхин К.А.</copyright-holder><copyright-holder xml:lang="en">Galatenko V., Kostiukhin K.</copyright-holder><license license-type="creative-commons-attribution" xlink:href="https://creativecommons.org/licenses/by/4.0/" xlink:type="simple"><license-p>This work is licensed under a Creative Commons Attribution 4.0 License.</license-p></license></permissions><self-uri xlink:href="https://www.t-niisi.ru/jour/article/view/54">https://www.t-niisi.ru/jour/article/view/54</self-uri><abstract><p>Работа посвящена исследованию возможностей применения аппаратных счетчиков производительности (специальных регистров центрального процессора) для выявления потенциальных угроз безопасности критически важных систем и комплексов. Авторами был доработан открытый прикладной программный интерфейс измерения производительности, с помощью которого осуществляется управление аппаратными счетчиками.</p></abstract><trans-abstract xml:lang="en"><p>The article discusses the possibility of using hardware performance counters, commonly used in the creating of system execution profiles, to identify potential security threats to critically important systems and complexes. The authors have ported an open Performance Application Programming Interface (PAPI), which is used to manage hardware counters.</p></trans-abstract><kwd-group xml:lang="ru"><kwd>счетчики производительности</kwd><kwd>информационная безопасность</kwd><kwd>атаки по сторонним каналам</kwd><kwd>PAPI</kwd></kwd-group><kwd-group xml:lang="en"><kwd>performance counters</kwd><kwd>information security</kwd><kwd>side-channels attacks</kwd><kwd>PAPI</kwd></kwd-group><funding-group xml:lang="ru"><funding-statement>«Публикация выполнена в рамках государственного задания по проведению фундаментальных исследований по теме «Исследование и реализация программной платформы для перспективных многоядерных процессоров» (FNEF-2022-002).»</funding-statement></funding-group></article-meta></front><back><ref-list><title>References</title><ref id="cit1"><label>1</label><citation-alternatives><mixed-citation xml:lang="ru">F. Liu, Y. Yarom, Q. Ge, G. Heiser, R.B. Lee. Last-Level Cache Side-Channel Attacks are Practical, Security Privacy. In Proceedings of the 2015 IEEE Symposium on Security and Privacy, San Jose, CA, USA, 17–21 May 2015.</mixed-citation><mixed-citation xml:lang="en">F. Liu, Y. Yarom, Q. Ge, G. Heiser, R.B. Lee. Last-Level Cache Side-Channel Attacks are Practical, Security Privacy. In Proceedings of the 2015 IEEE Symposium on Security and Privacy, San Jose, CA, USA, 17–21 May 2015.</mixed-citation></citation-alternatives></ref><ref id="cit2"><label>2</label><citation-alternatives><mixed-citation xml:lang="ru">PAPI User's Guide, http://icl.cs.utk.edu/papi/</mixed-citation><mixed-citation xml:lang="en">PAPI User's Guide, http://icl.cs.utk.edu/papi/</mixed-citation></citation-alternatives></ref><ref id="cit3"><label>3</label><citation-alternatives><mixed-citation xml:lang="ru">Vishnyakov A.V., Nurmukhametov A.R., Kurmangaleev S.F., Gaisaryan S.S. Method for analysis of code-reuse attacks. Proceedings of the Institute for System Programming of the RAS (Proceedings of ISP RAS). 2018;30(5):31-54. (In Russ.)</mixed-citation><mixed-citation xml:lang="en">Vishnyakov A.V., Nurmukhametov A.R., Kurmangaleev S.F., Gaisaryan S.S. Method for analysis of code-reuse attacks. Proceedings of the Institute for System Programming of the RAS (Proceedings of ISP RAS). 2018;30(5):31-54. (In Russ.)</mixed-citation></citation-alternatives></ref><ref id="cit4"><label>4</label><citation-alternatives><mixed-citation xml:lang="ru">Oliver Moradov. Code Injection in Brief: Types, Examples, and Mitigation, 2022, https://bright-sec.com/blog/code-injection/</mixed-citation><mixed-citation xml:lang="en">Oliver Moradov. Code Injection in Brief: Types, Examples, and Mitigation, 2022, https://bright-sec.com/blog/code-injection/</mixed-citation></citation-alternatives></ref><ref id="cit5"><label>5</label><citation-alternatives><mixed-citation xml:lang="ru">Pablo Pessoa do Nascimento, Paulo Pereira, Jr Marco Mialaret, Isac Ferreira, Paulo Maciel. A methodology for selecting hardware performance counters for supporting non-intrusive diagnostic of flood DDoS attacks on web servers, Computers &amp; Security, Volume 110, 2021, https://www.sciencedirect.com/science/article/pii/S0167404821002583</mixed-citation><mixed-citation xml:lang="en">Pablo Pessoa do Nascimento, Paulo Pereira, Jr Marco Mialaret, Isac Ferreira, Paulo Maciel. A methodology for selecting hardware performance counters for supporting non-intrusive diagnostic of flood DDoS attacks on web servers, Computers &amp; Security, Volume 110, 2021, https://www.sciencedirect.com/science/article/pii/S0167404821002583</mixed-citation></citation-alternatives></ref><ref id="cit6"><label>6</label><citation-alternatives><mixed-citation xml:lang="ru">Mastik: A Micro-Architectural Side-Channel Toolkit, https://github.com/0xADE1A1DE/Mastik</mixed-citation><mixed-citation xml:lang="en">Mastik: A Micro-Architectural Side-Channel Toolkit, https://github.com/0xADE1A1DE/Mastik</mixed-citation></citation-alternatives></ref><ref id="cit7"><label>7</label><citation-alternatives><mixed-citation xml:lang="ru">S. Das, J. Werner, M. Antonakakis, M. Polychronakis, F. Monrose. SoK: The Challenges, Pitfalls, and Perils of Using Hardware Performance Counters for Security. 2019 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 2019, pp. 20-38.</mixed-citation><mixed-citation xml:lang="en">S. Das, J. Werner, M. Antonakakis, M. Polychronakis, F. Monrose. SoK: The Challenges, Pitfalls, and Perils of Using Hardware Performance Counters for Security. 2019 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 2019, pp. 20-38.</mixed-citation></citation-alternatives></ref></ref-list><fn-group><fn fn-type="conflict"><p>The authors declare that there are no conflicts of interest present.</p></fn></fn-group></back></article>
