z-logo
open-access-imgOpen Access
Development of a Method for Building a Trusted Environment by Using Hidden Software Agent Steganography
Author(s) -
V Kh Fedorov,
E.G. Balenko,
S. I. Shterenberg,
Andrey Krasov
Publication year - 2021
Publication title -
journal of physics. conference series
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.21
H-Index - 85
eISSN - 1742-6596
pISSN - 1742-6588
DOI - 10.1088/1742-6596/2096/1/012047
Subject(s) - computer security , computer science , compromise , insider , software , insider threat , secure coding , quality (philosophy) , steganography , software engineering , internet privacy , data science , software security assurance , information security , law , security service , operating system , philosophy , epistemology , embedding , artificial intelligence , political science
For more than a decade, the scientific community has been developing various models of insider actions in the trusted-zone information system and methods for identifying such. All those years, they have been facing the challenge of finding quality data samples for analysis and testing, and it is the availability of reliable data on the attack that is crucial for any research or detection of attempts to steal or compromise legal software. Unfortunately, collection of such samples remains nearly impossible despite some attempts to do so. Any data on incidents is either incomplete or inaccurate, or is not available at all. Software developers also face lack of resources, including time. Developers do not have enough time, funding, material resources, or qualifications to make a sturdy security system, which is why they need to use third-party automations that dock a security module to the compiled program. The strength of this approach is that such a system can be embedded in any software, whereas the weakness is that the method is "one-size-fits-all". Standard protections span across multiple programs, which results in a higher chance of being hacked.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here