Attack Simulation based Software Protection Assessment Method with Petri Net
نویسندگان
چکیده
منابع مشابه
A Petri Net Based Software Architecture for UAV Simulation
This paper presents a Petri net-based hierarchical architecture for multiple Unmanned Aerial Vehicle (UAV) simulations in order to facilitate rapid prototyping via visual modeling and analysis. Using high-level Colored Petri nets, we specify UAV control structure by a hierarchy of mission control net and task nets: the mission control net, built upon task nets, models the decision making proces...
متن کاملPetri Net Based Software Dependability Engineering
Methods of software dependability engineering can be divided into two groups methods to improve the software dependability and methods to predict the reached degree of software dependability. Among those methods, which aim at the improvement of software dependability, the Petri net based validation techniques to avoid faults during the development phase have attract a lot of attention in the la...
متن کاملPetri-net-based Workflow Management Software
At the moment more than 250 Workflow Management Systems (WFMSs) are under development. This signifies that the term ‘workflow management’ is not just another buzzword. The phenomenon workflow management will have a tremendous impact on the next generation of information systems. Nevertheless, workflow management is still in its infancy. Despite the efforts of the Workflow Management Coalition (...
متن کاملA Network Attack Model based on Colored Petri Net
The researches have shown that not all the Petri Net machines can be used to describe attack behavior. When Petri Net machines adapted for attack behavior modeling are detecting the network, for some event of current status, if there is matching event in the model, it has only one corresponding transition; otherwise that may cause errors. Since sharing synthesis and synchronization synthesis of...
متن کاملAn Attack on SMC-Based Software Protection
Self-modifying codes (SMC) refer to programs that intentionally modify themselves at runtime, causing the runtime code to differ from the static binary representation of the code before execution. Hence SMC is an effective method to obstruct software disassembling. This paper presents a method which circumvents the SMC protection, thus improving the performance of disassembling. By disabling th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal on Cyber Situational Awareness
سال: 2016
ISSN: 2057-2182,2633-495X
DOI: 10.22619/ijcsa.2016.100108