• Home
  • Dmitry Sergeevich Levshun
Dmitry Sergeevich Levshun

Dmitry Sergeevich Levshun
St. Petersburg Federal Research Center of the Russian Academy of Sciences · SPIIRAS

Doctor of Philosophy
Looking for collaborations and joint projects

About

48
Publications
5,015
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
264
Citations
Introduction
A young and promising scientist in the field of information security. More than 20 publications indexed by Scopus and Web of Science, 3 of which are in the Q1 quartile. Over 20 certificates of Russian state registration of programs and databases. Active participant in more than 10 research projects of the RSF, RFBR, FTP, and other funds.

Publications

Publications (48)
Preprint
Full-text available
In recent years, diffusion models have become one of the main methods for generating images. However, detecting images generated by these models remains a challenging task. This paper proposes a novel method for detecting images generated by Latent Diffusion Models (LDM) by identifying artifacts introduced by their autoencoders. By training a detec...
Article
Nowadays, people spend a lot of time in the information space, communicating within various social platforms. Content of those platforms can influence people’s feelings and personalities, which is especially relevant for young people. In this research, we made an attempt to prove this hypothesis. For the experiment, we selected the VKontakte social...
Conference Paper
Full-text available
Attack graphs have long been a popular method for modelling multistep attacks. They are useful for assessing the likelihood of network hosts being compromised and identifying attack paths with the highest probability and impact. Typically, this analysis relies on information about vulnerabilities from open databases. However, many devices are not i...
Chapter
One of the most effective approaches to network security analysis is using attack graphs that are based on vulnerabilities from open databases. In this case, the problem may arise that different standards are used to describe vulnerability metrics, while values of some crucial metrics are missing. In this work, it is proposed to compare machine lea...
Article
Full-text available
The work process of specialists in protection from information consists of many time-consuming tasks, including data collection, datasets formation, and data manual labelling. In this paper, we attempted to help such specialists with a two-model approach based on the iterative online training of binary classifiers. This approach is used for inappro...
Article
Full-text available
The origin of the trademark similarity analysis problem lies within the legal area, specifically the protection of intellectual property. One of the possible technical solutions for this issue is the trademark similarity evaluation pipeline based on the content-based image retrieval approach. CNN-based off-the-shelf features have shown themselves a...
Preprint
Full-text available
CNN-based off-the-shelf features have shown themselves as a good baseline for trademark retrieval. However, in recent years, the computer vision area was transitioning from CNNs to a new architecture – Vision Transformer. In this paper, we investigate the performance of off-the-shelf features extracted with vision transformers and explore the effec...
Conference Paper
Full-text available
For many years, attack graphs have been one of the most popular approaches to model multistep attacks. This approach allows evaluating the possibility of each host in the system being compromised and to find attack paths with the most probability and impact. This paper describes an original approach to vulnerability categorisation for fast multiste...
Article
The article proposes a hierarchical model for the design of microcontroller-based systems protected from cyber-physical attacks. Within the framework of this model, a microcontroller-based system is represented as a hierarchical relational set of interacting building blocks with different properties and links between them. The proposed model includ...
Article
Full-text available
Журнал "Вопросы кибербезопасности" / Cybersecurity issues journal / RU: / Цель статьи: устранение противоречия, состоящего в существующей потребности в наборе простых и понятных показателей защищенности информации и персональных данных для пользователей устройств интернета вещей и их производителей, и отсутствием такого набора, объединяющего взаимо...
Preprint
Full-text available
The work process of specialists in protection from information consists of many time-consuming tasks, including data collection, datasets formation, and data manual labelling. In this paper, we attempted to help such specialists with a two-model approach based on the iterative online training of binary classifiers. This approach is used for inappro...
Article
Full-text available
Nowadays, the whole driver monitoring system can be placed inside the vehicle driver's smartphone, which introduces new security and privacy risks to the system. Because of the nature of the modern transportation systems, the consequences of the security issues in such systems can be crucial, leading to threat to human life and health. Moreover, de...
Chapter
The paper describes a new technique for the design of abstract models of microcontroller-based physical security systems. Under the abstract model of the system, this work considers an abstract representation of the system, the design of which is carried out based on abstract elements such as electronic components, microcontrollers and single-board...
Chapter
A consequence of the widespread use of mobile devices is the emergence of a threat to information security. One of the reasons for this lies in the vulnerabilities of device interaction interfaces. This area is quite new, so it is not well investigated. The aim of this investigation is to classify and analyze vulnerabilities of infrastructure inter...
Chapter
Full-text available
Wide application of IoT devices together with the growth of cyber attacks against them creates a need for a simple and clear system of security metrics for the end users and producers that will allow them to understand how secure their IoT devices are and to compare these devices with each other, as well as to enhance the security of the devices. T...
Article
The use of mobile robotic devices for perimeter monitoring is a new fundamental scientific problem, and its solution can significantly increase the level of security for strategic facilities. The paper presents the results of the analysis of existing studies aimed at developing solutions for managing a swarm of heterogeneous robotic devices and the...
Article
Full-text available
This paper describes an original methodology for the design of microcontroller-based physical security systems and its application for the system of mobile robots. The novelty of the proposed methodology lies in combining various design algorithms on the basis of abstract and detailed system representations. The suggested design approach, which is...
Thesis
One of the possible ways to ensure the security of microcontroller-based systems is the implementation of security by design approach. Unfortunately, existing approaches are not without drawbacks, that is why this thesis is aimed at developing the new one. Moreover, among all possible systems, in this work, only physical security systems were chose...
Conference Paper
Full-text available
The paper considers the task of bot detection in social networks. Study is focused on the case when the account is closed by the privacy settings, and the bot needs to be identified by the friend list. The paper proposes a solution that is based on machine learning and statistical methods. Social network VKontakte is used as a data source. The pape...
Conference Paper
Full-text available
The paper considers the task of bot detection in social net-works. It checks the hypothesis that bots break Benford’s law much more often than users, so one can identify them. A bot detection approach is proposed based on experiments where the test results for bot datasets of different classes and real-user datasets of different communities are eva...
Chapter
In this paper we present analysis of attack actions on the railway infrastructure based on the integrated model. The novelty of the presented solution is in combination of the component-based approach, which is used to detect attack vectors based on the presence of vulnerabilities, the semi-natural model, which is used to model vulnerabilities expl...
Article
The paper suggests a new methodology for secure cyber–physical systems design. The proposed methodology consists of two main cycles. The main goal of the first cycle is in design of the system model, while the second one is about development of the system prototype. The key idea of the methodology is in providing of the most rational solutions that...
Article
Full-text available
This paper is an analysis and systematization of modern research in the field of cyber-physical system information security. The problematic issues of information security of such systems are considered: «what is being attacked?», «who is attacking?», «why is someone attacking?», «how is someone attacking?» and «how to protect the system?». As an a...
Article
The paper describes the new model, which is a key element of the design and verification methodology for secure cyber-physical systems. The proposed model represents cyber-physical systems as a set of building blocks with properties and connections between them, while each building block is the projection of the integrated model. The models of atta...
Chapter
Attribute-Based Access Control (ABAC) model is a perspective access control model for cloud infrastructures used for automation of industrial, transport and energy systems as they include large number of users, resources and dynamical changed permissions. The paper considers the features of ABAC model and the theoretical background for verification...
Chapter
This paper considers a new integrated model of secure cyber-physical systems for their design and verification. The suggested integrated model represents cyber-physical systems as a set of building blocks with properties and connections between them. The main challenge to build this model is in consolidating different approaches for modeling of cyb...
Chapter
The paper considers determination of destructive information impacts and personal tendencies of young generation that predispose them to uncritical comprehension of the content with destructive components. An application of traditional manual and semi-automatic methods seems ineffective because of the huge amount of information in the Internet spac...
Chapter
The problem of effective counteraction to the malicious data transfer channels is of importance in any area where data transfer is performed. One of the aspects of the Mobile Internet Security is detecting such channels, regardless the way these channels are organized. Steganography is one of the ways to interact without attracting attention, and s...
Article
In this paper a combined model of secure cyber-physical systems for their design and verification is proposed. Within the framework of this model, a cyber-physical system is represented as a set of blocks with various properties and relationships between them. The main challenge in such model construction is to combine various approaches to the mod...
Article
Full-text available
The paper considers a new design methodology for organization of reliable and secure data transferenvironment in cyber-physical systems, which contain microcontroller-based devices. The keyidea of the design methodology is in providing of most rational solution to improve the data transferenvironment according to functional and non-functional requi...
Article
Full-text available
The paper proceeds research of the security event correlation methods in Security Information and Event Management (SIEM) systems. In this part we consider correlation methods of information security events that can be applied during separate correlation stages described in the previous paper. Classification of the considered correlation methods an...
Article
Full-text available
С точки зрения информационной безопасности встроенные устройства представляют собой элементы сложных киберфизических систем, работающих в потенциально враждебном окружении. Поэтому разработка таких устройств является сложной задачей, часто требующей экспертных решений. Сложность задачи разработки защищенных встроенных устройств обуславливается разл...
Article
Full-text available
The paper is devoted to the analysis of security event correlation methods in Security Information and Event Management (SIEM) systems. The correlation process is considered to be a multilevel hierarchy of stages. The goal of each stage consists in executing appropriate operations on security data being processed. Based on this analysis we outline...
Article
As elements of complex information systems, embedded devices define informational and physical connections between the level of software control of the system on the one hand, and its technical environment and users on the other. Operating in a potentially volatile and untrusted cyber-physical environment, using insufficiently secure communication...
Conference Paper
From information security point of view embedded devices are the elements of complex systems operating in a potentially hostile environment. Therefore development of embedded devices is a complex task that often requires expert solutions. The complexity of the task of developing secure embedded devices is caused by various types of threats and atta...

Network

Cited By