Attack Simulation based Software Protection Assessment Method with Petri Net

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Petri Net Based Software Architecture for UAV Simulation

This paper presents a Petri net-based hierarchical architecture for multiple Unmanned Aerial Vehicle (UAV) simulations in order to facilitate rapid prototyping via visual modeling and analysis. Using high-level Colored Petri nets, we specify UAV control structure by a hierarchy of mission control net and task nets: the mission control net, built upon task nets, models the decision making proces...

متن کامل

Petri Net Based Software Dependability Engineering

Methods of software dependability engineering can be divided into two groups methods to improve the software dependability and methods to predict the reached degree of software dependability. Among those methods, which aim at the improvement of software dependability, the Petri net based validation techniques to avoid faults during the development phase have attract a lot of attention in the la...

متن کامل

Petri-net-based Workflow Management Software

At the moment more than 250 Workflow Management Systems (WFMSs) are under development. This signifies that the term ‘workflow management’ is not just another buzzword. The phenomenon workflow management will have a tremendous impact on the next generation of information systems. Nevertheless, workflow management is still in its infancy. Despite the efforts of the Workflow Management Coalition (...

متن کامل

A Network Attack Model based on Colored Petri Net

The researches have shown that not all the Petri Net machines can be used to describe attack behavior. When Petri Net machines adapted for attack behavior modeling are detecting the network, for some event of current status, if there is matching event in the model, it has only one corresponding transition; otherwise that may cause errors. Since sharing synthesis and synchronization synthesis of...

متن کامل

An Attack on SMC-Based Software Protection

Self-modifying codes (SMC) refer to programs that intentionally modify themselves at runtime, causing the runtime code to differ from the static binary representation of the code before execution. Hence SMC is an effective method to obstruct software disassembling. This paper presents a method which circumvents the SMC protection, thus improving the performance of disassembling. By disabling th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal on Cyber Situational Awareness

سال: 2016

ISSN: 2057-2182,2633-495X

DOI: 10.22619/ijcsa.2016.100108