main| new issue| archive| editorial board| for the authors| publishing house|
Ðóññêèé
Main page
New issue
Archive of articles
Editorial board
For the authors
Publishing house

 

 


ABSTRACTS OF ARTICLES OF THE JOURNAL "INFORMATION TECHNOLOGIES".
No. 9. Vol. 24. 2018

DOI: 10.17587/it.24.594-600

M. A. Styugin, Ph. D., e-mail: styugin@gmail.com, V. V. Zolotarev, Ph. D., e-mail: amida.2@yandex.ru, N. Y. Parotkin, e-mail: nyparotkin@yandex.ru, Reshetnev Siberian State University of Science and Technology, Krasnoyarsk, Russian Federation

Protection of Information Systems from Undetected Vulnerabilities

The problem of protecting information systems from vulnerabilities that were not detected at a system's development stage is considered. It is demonstrated that the main technique for protection from vulnerabilities of that kind is protecting information systems and processes from reconnaissance by an adversary. The formal definition of the protection's objective, which is establishing undistinguishable information systems with the target function and data leak side channels, is presented in the paper. Indiscernibility by target function means that attacker's ability to send data to the system and observe the results of its operation does not provide any information that can be used for exploiting the system's vulnerabilities. Indiscernibility by side channels means that observation of all external manifestations of the system's functioning, such as time delays, impact on the computing device, etc. do not provide any information on the value of the system's target function. The system's indiscernibility by target function can be established by separating the input value range and applying different processing logic for them. A modified algorithm for running in an untrusted computation environment should be implemented for non-standard input values. Proof is provided that indistinguishable obfuscation allows establishing Indistinguishability via data leak side channels. A method for providing a system's indistinguishability by the target function. The technique's effectiveness is demonstrated with instances of remote code injection attacks at an application.
Keywords: protection from research, indistinguishability, code injection attack, indistinguishable obfuscation

P. 594–600

To the contents