
Semantic model of an exploit’s source code for data protection in automation systems
Author(s) -
E. V. Fedorchenko,
Andrey Fedorchenko
Publication year - 2021
Publication title -
iop conference series. materials science and engineering
Language(s) - English
Resource type - Journals
eISSN - 1757-899X
pISSN - 1757-8981
DOI - 10.1088/1757-899x/1047/1/012074
Subject(s) - exploit , computer science , source code , semantic data model , automation , control flow graph , graph , code (set theory) , data flow diagram , code generation , data mining , programming language , theoretical computer science , artificial intelligence , database , computer security , engineering , mechanical engineering , set (abstract data type) , key (lock)
Data protection is especially relevant in automation systems nowadays. The paper proposes a semantic model of exploit’s source code as a basis for unknown attacks detection, forecasting and assessment and therefore for automated data protection from cyber attacks. The proposed model combines a control flow graph with a function call dependencies graph. The paper describes model generation technique that is based on the analysis of exploit’s source code and incorporates code compilation, its decompilation, building the functional semantic models of the exploits, and, finally, comparing these models and generating the standard semantic model of exploits’ source code. Application of the technique for generation of exploit’s model is demonstrated on a case study.