N. Zayka, O. Verkhovets, M. Komarov, O. Saveliev
Èlektron. model. 2025, 47(4):49-56
https://doi.org/10.15407/emodel.47.04.049
ABSTRACT
The development of an obfuscator for cybersecurity of critical infrastructure software is considered. The main attention is paid to the analysis of modern threats that may arise from malicious code analysis and the development of obfuscation algorithms to complicate reverse engineering. The impact of obfuscation methods on the performance and compatibility of software with other OCI subsystems is evaluated, and recommendations for the implementation of such methods in the development and operation processes are developed.
KEYWORDS
critical infrastructure objects, information technologies, obfuscator, software protection, cyber protection, personnel, recommendations.
REFERENCES
- Brunton F., Nissenbaum H. (2015). Obfuscation: A User’s Guide for Privacy and Protest. 5-6.
- Dowd M., McDonald J., Schuh J. (2006). The Art of Software Security Assessment. 46-48.
- Zhurylenko B., Nikolayeva N. (2015). Determination of the coefficient of effectiveness of technical protection of information according to its parameters. Information security. T. 21. No. 3, 245-250
- McNab C. (2004). Network Security Assessment: Know Your Network. 3-7.
- Dang B., Gazet A., Bachaalany E. (2014). Practical Reverse Engineering. 384 p.
- Singer P.W., Friedman A. (2014). Cybersecurity and Cyberwar: What Everyone Needs to Know. 306 p.
- Kireenko O. (2017). Model of the violator in information and communication systems. Legal, regulatory and metrological support of the information protection system in Ukraine. T. 2. No. 34, 65-79.
- Ivanchenko S.O., Havrylenko O.V., Lipskyi O.A. and others. (2016). Technical channels of information leakage. Procedure for creating complexes of technical protection of information: training manual of NTUU "KPI". Kyiv: NTUU "KPI", 104 p.
- Polishchuk Y., Hnatyuk S., Seilova N. (2015). Mass media as a channel of manipulative influence on society. Information security. T. 21. No. 3, 301-308.
- Mitnick K. (2011). The Art of Deception: Controlling the Human Element of Security. 368 p.