2020
DOI: 10.15587/1729-4061.2020.206232
|View full text |Cite
|
Sign up to set email alerts
|

Development of unified mathematical model of programming modules obfuscation process based on graphic evaluation and review method

Abstract: advanced capabilities while providing a variety of security services in general. One of the methods of protecting the code of a software product is the obfuscation process [3], which provides the services of information security and privacy. Thus, obfuscation is an important component of providing practical security services. The software obfuscation process consists of subprocesses that may or may not be used depending on the business process, total runtime, and level of protection provided. Creating models f… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
8
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(8 citation statements)
references
References 13 publications
0
8
0
Order By: Relevance
“…The effectiveness of the chi-squared criterion is estimated asymptotically. When the main hypothesis is confirmed, the distribution of statistics asymptotically tends to the distribution of chi-square, which is tabulated, for example, in [6].…”
Section: Literature Review and Problem Statementmentioning
confidence: 99%
See 1 more Smart Citation
“…The effectiveness of the chi-squared criterion is estimated asymptotically. When the main hypothesis is confirmed, the distribution of statistics asymptotically tends to the distribution of chi-square, which is tabulated, for example, in [6].…”
Section: Literature Review and Problem Statementmentioning
confidence: 99%
“…In [6], it is emphasized and practically proved that the convergence of statistics to the distribution of chi-squared random variables takes place only for a distribution vector with independent coordinates, otherwise the number of degrees of freedom in the boundary distribution increases. However, when conducting an experiment, the number of nonzero coordinates of the probability vector is initially unknown.…”
Section: Literature Review and Problem Statementmentioning
confidence: 99%
“…In work [5], an attempt was made to develop GERT models in order to unify the problems by using the Erlang distribution with different coefficients. However, that solution did not make it possible to avoid errors in the simulation results under the conditions of uncertainty of input or intermediate data.…”
Section: Literature Review and Problem Statementmentioning
confidence: 99%
“…It should be noted that these procedures should take into consideration the fuzziness of the input and output data. Transitions (1-5) and (3)(4)(5) characterize the process of manual software analysis. Transitions (2-6), (3)(4)(5)(6), (4)(5)(6), and (5-6) describe one of the most complex processes in terms of mathematical formalization, the decision-making process, and confirmation of software vulnerabilities.…”
Section: Literature Review and Problem Statementmentioning
confidence: 99%
See 1 more Smart Citation