Attack simulation based software protection assessment method
Book chapter
Zhang, Gaofeng, Falcarin, P., Gomez-Martinez, Elena, Islam, Shareeful, Tartary, Christophe, De Sutter, Bjorn and d'Annoville, Jerome 2016. Attack simulation based software protection assessment method. in: 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security) IEEE.
Authors | Zhang, Gaofeng, Falcarin, P., Gomez-Martinez, Elena, Islam, Shareeful, Tartary, Christophe, De Sutter, Bjorn and d'Annoville, Jerome |
---|---|
Abstract | Software protection is an essential aspect of information security to withstand malicious activities on software, and preserving software assets. However, software developers still lacks a methodology for the assessment of the deployed protections. To solve these issues, we present a novel attack simulation based software protection assessment method to assess and compare various protection solutions. Our solution relies on Petri Nets to specify and visualize attack models, and we developed a Monte Carlo based approach to simulate attacking processes and to deal with uncertainty. Then, based on this simulation and estimation, a novel protection comparison model is proposed to compare different protection solutions. Lastly, our attack simulation based software protection assessment method is presented. We illustrate our method by means of a software protection assessment process to demonstrate that our approach can provide a suitable software protection assessment for developers and software companies. |
Book title | 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security) |
Year | 2016 |
Publisher | IEEE |
Publication dates | |
11 Jul 2016 | |
Publication process dates | |
Deposited | 06 Oct 2016 |
Event | 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security) |
ISBN | 978-1-5090-0709-7 |
Digital Object Identifier (DOI) | https://doi.org/10.1109/CyberSecPODS.2016.7502352 |
Additional information | © 2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. |
Accepted author manuscript |
https://repository.uel.ac.uk/item/85047
Download files
286
total views194
total downloads6
views this month1
downloads this month