![]() Section 7 discusses the features of the proposed solution and compares it with analogues. The analysis of the results of the experiment is carried out. A matrix is constructed for assigning the tested files to the selected Architectures. In Section 6, experiments are made with the developed Identification Method and Utility for the Top-16 Architectures. ![]() Section 5 describes the Utility that implements the MC Architecture Identification Method. Section 4 describes the scheme of the Identification Method, gives its formal notation, and also provides algorithms for its main modes of operation. The scheme of the model and the description of all its elements are given. Section 3 is devoted to the ontological model of the subject area of research, on the basis of which all subsequent stages are built. Section 2 provides an analytical review of relevant work with an emphasis on the analysis of executable files to further identify the MC Architecture. The structure of the article corresponds to the sequence of research stages. One of the ways to ensure security is the static analysis of such information systems and their devices, which are subject to attacks or in which the carriers of malicious actions themselves operate. The CyberDevice often form entire closely interacting cyber-physical information systems. ![]() It is possible to counteract physical damage by ensuring the safe operation of programs that control the operation of the CyberDevice. In addition, physical security depends more than ever on information. Therefore, physical damage may be the result of information attacks. At the same time, it is necessary to note the critical feature of CyberDevice-this is the influence of information on the physical world and vice versa. The essence of CyberDevice, which provides such a wide application, is the close integration of information technology (essentially software) with physical entities. As a result, a probabilistic assessment of the utility’s work was obtained by assigning various programs to the Top-16 selected architectures.Ĭyber physical devices (abbreviated as CyberDevices) can be found in almost all spheres of life: in residential buildings, on roads and in intelligent vehicles, in industry, during rescue operations, in the interests of occupational safety and health, in medicine, etc. Basic testing of the identification utility has been conducted. The principle of operation of the utility is presented in the form of functional and informational diagrams. A software tool for identifying the MC architecture has been developed in the form of a separate utility that implements the algorithms of the method. A method for identifying the MC architecture has been synthesized, which includes three successive phases: unpacking the OS image (for a set of identified architectures) building signatures of architectures (their “digital portraits” from the position of MC instructions) identification of the MC architecture for the program under test (using the collected architecture signatures), implemented using four operating modes. The specificity of the machine code is analyzed, and an analytical record of the process of identifying the architecture of the machine code (MC) processor is obtained. An ontological model of the subject area is constructed, introducing the basic concepts and their relationships. A basic systematization of the Executable and Linkable Format and Portable Executable formats of programs, as well as the analysis mechanisms used and the goals achieved, is made. ![]() This work solves the problem of identification of the machine code architecture in cyberphysical devices.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |