z-logo
open-access-imgOpen Access
Attack Simulation based Software Protection Assessment Method with Petri Net
Author(s) -
Gaofeng Zhang,
Paolo Falcarin,
Elena Gómez-Martínez,
Shareeful Islam,
Christophe Tartary,
Bjorn De Sutter,
Jérôme d’Annoville
Publication year - 2016
Publication title -
international journal on cyber situational awareness
Language(s) - English
Resource type - Journals
eISSN - 2633-495X
pISSN - 2057-2182
DOI - 10.22619/ijcsa.2016.100108
Subject(s) - petri net , computer science , software , net (polyhedron) , computer security , reliability engineering , software engineering , engineering , programming language , mathematics , geometry
Software protection is an essential aspect of information security to withstand malicious activities on software, and preserving valuable software assets. However, software developers still lack an effective methodology for the assessment of deployed protections, especially in the area of mobile applications. To solve these issues, we present a novel attack simulation based software protection assessment method to evaluate and compare different protection solutions. Our solution relies on Petri Nets to specify and visualize attack models of mobile applications. We developed a Monte Carlo based approach to simulate attacking processes and to deal with the uncertainty. Then, based on this simulation, a novel protection comparison model is proposed to compare different protection solutions. Finally, our attack simulation based software protection assessment method is presented. We illustrate our method by means of a case study process to demonstrate that our approach can provide a suitable software protection assessment for developers and software companies.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom