首页> 外文会议>International Haifa verification conference >Probabilistic Model of Control-Flow Altering based Malicious Attacks (Poster submission)
【24h】

Probabilistic Model of Control-Flow Altering based Malicious Attacks (Poster submission)

机译:基于控制流变更的恶意攻击的概率模型(海报提交)

获取原文

摘要

Introduction. The system designers need in various design tools which could help them both for estimation of possible threats to the security and select one or another ways of their neutralization. There are many approaches to the evaluation (verification) of the degree of protection of programs against possible attacks. First of all, this is fault Injection (FI) simulation techniques [1]. Main drawback of the FI is necessity to have different expensive software that can be not used to solve other design problems, in particular for functional verification and testing. Also, due to the similarity between system failures because of intentional attacks and those due to accidental component failures, reliability/availability-like models to evaluate system survivability are used in the security design [2]. But they are based on Continuous Time Markov Chain (CTMC), identification of which deals with some technical difficulties.
机译:介绍。系统设计人员需要各种设计工具,这些工具既可以帮助他们估计对安全性可能造成的威胁,又可以选择一种或另一种中和方式。评估(验证)程序对可能的攻击的保护程度的方法有很多。首先,这是故障注入(FI)仿真技术[1]。 FI的主要缺点是必须拥有其他昂贵的软件,这些软件不能用于解决其他设计问题,尤其是功能验证和测试。同样,由于有意攻击导致的系统故障与意外组件故障导致的系统故障之间的相似性,在安全性设计中使用了类似于可靠性/可用性的模型来评估系统的生存能力[2]。但是它们基于连续时间马尔可夫链(CTMC),对其进行识别会遇到一些技术难题。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号