Author:
Fedorov V Kh,Balenko E G,Shterenberg S I,Krasov A V
Abstract
Abstract
For more than a decade, the scientific community has been developing various models of insider actions in the trusted-zone information system and methods for identifying such. All those years, they have been facing the challenge of finding quality data samples for analysis and testing, and it is the availability of reliable data on the attack that is crucial for any research or detection of attempts to steal or compromise legal software. Unfortunately, collection of such samples remains nearly impossible despite some attempts to do so. Any data on incidents is either incomplete or inaccurate, or is not available at all.
Software developers also face lack of resources, including time. Developers do not have enough time, funding, material resources, or qualifications to make a sturdy security system, which is why they need to use third-party automations that dock a security module to the compiled program. The strength of this approach is that such a system can be embedded in any software, whereas the weakness is that the method is "one-size-fits-all". Standard protections span across multiple programs, which results in a higher chance of being hacked.
Subject
General Physics and Astronomy
Reference16 articles.
1. On the use of Bhattacharyya distance as a measure of the detectability of steganographic systems;Korzhik;Lecture Notes in Computer Science,2008
2. Methods for building a trusted environment in Unix operating systems based on the implementation of a digital watermark;Krasov,2020
3. A study of the correctness of the execution of a class file with an embedded digital watermark in different environments;Sharikov;IOP Conference Series: Materials Science and Engineering,2020
4. Behavioral Analysis of Resource Allocation Systems in Cloud Infrastructure;Krasov,2019
5. Embedding the hidden information into java byte code based on operands’ interchanging;Krasov;ARPN Journal of Engineering and Applied Sciences,2018