Lysytsia D. A method for testing security software for protecting information using reverse engineering technology

Українська версія

Thesis for the degree of Candidate of Sciences (CSc)

State registration number

0419U002086

Applicant for

Specialization

  • 05.13.21 - Системи захисту інформації

02-04-2019

Specialized Academic Board

Д 26.861.06

State University of Telecommunications

Essay

The dissertation solves the problem of developing a software security testing method for the protection of information using reverse engineering technologies. The purpose of the dissertation research is to provide the necessary level of security software based on the synthesis of methods and means of testing using reverse engineering technologies. For the first time a mathematical model of the initial generation of the cyberattack code for unauthorized access to information resources has been developed, which takes into account during the process of mathematical formalization of the GERT-network, the main stages of code generation for Windows or Linux operating systems with the ability to find solutions on the Internet, which allowed finding the maximum values of probability distribution density time of the initial generation of the cyberattack code of unauthorized access to information resources. The mathematical model of the processes of active analysis of the resource management system has been improved and implemented into a system of protection that differs from the known factors taking into account the completeness of the test methods and the completeness of the specification during the implementation of the algorithm in the security system, which allowed to increase the effectiveness of software security testing. The method for allocating a binary code for software security testing is improved, which differs from the well-known ability to include iterative scripts in reverse engineering, when new tracks are added to the review and there are no restrictions on the nature of the code being analyzed, which allowed to increase the security level of the software.

Files

Similar theses