Розробка та застосування обфускатора для кіберзахисту об’єктів критичної інфраструктур.

Saved in:
Bibliographic Details
Title: Розробка та застосування обфускатора для кіберзахисту об’єктів критичної інфраструктур. (Ukrainian)
Alternate Title: DEVELOPMENT AND APPLICATION OF AN OBFUSCATOR FOR CYBERSECURITY OF CRITICAL INFRASTRUCTURE OBJECTS. (English)
Authors: Заїка, Н. В., Верховець, О. С., Комаров, М. Ю., Савельєв, О. С.
Source: Èlektronnoe Modelirovanie; 2025, Vol. 47 Issue 4, p49-56, 8p
Subject Terms: REVERSE engineering, MALWARE, SOFTWARE development tools, INTERNET security, COMPUTER performance, INFORMATION technology
Abstract: The development of an obfuscator for cybersecurity of critical infrastructure software is considered. The main attention is paid to the analysis of modern threats that may arise from malicious code analysis and the development of obfuscation algorithms to complicate reverse engineering. The impact of obfuscation methods on the performance and compatibility of software with other OCI subsystems is evaluated, and recommendations for the implementation of such methods in the development and operation processes are developed. [ABSTRACT FROM AUTHOR]
Copyright of Èlektronnoe Modelirovanie is the property of Pukhov Institute for Modeling in Energy Engineering National Academy of Sciences of Ukraine and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
Database: Complementary Index
Description
Abstract:The development of an obfuscator for cybersecurity of critical infrastructure software is considered. The main attention is paid to the analysis of modern threats that may arise from malicious code analysis and the development of obfuscation algorithms to complicate reverse engineering. The impact of obfuscation methods on the performance and compatibility of software with other OCI subsystems is evaluated, and recommendations for the implementation of such methods in the development and operation processes are developed. [ABSTRACT FROM AUTHOR]
ISSN:02043572
DOI:10.15407/emodel.47.04.049