Abstract

Ensuring the security of modern cyberphysical devices is the most important task of the modern world. The reason for this is that such devices can cause not only informational, but also physical damage. One of the approaches to solving the problem is the static analysis of the machine code of the firmware of such devices. The situation becomes more complicated in the case of a Smart Home, since its devices can have different processor architectures (means instruction sets). In the case of cyberphysical devices of the Smart Home, the destruction of machine code due to physical influences is also possible. Therefore, the first step is to correctly identify the processor architecture. In the interests of this, a machine code model is proposed that has a formal notation and takes into account the possibility of code destruction. The article describes the full cycle of research (including experiment) in order to obtain this model. The model is based on byte-frequency machine code signatures. The experiment resulted in obtaining template signatures for the Top-16 processor architectures: Alpha, X32, Amd64, Arm64, Hppa64, I486, I686, Ia64, Mips, Mips64, Ppc, Ppc64, RiscV64, S390, S390x and Sparc64.

Highlights

  • Information security, the relevance of which in the modern world is unconditional, affects many areas that relate to countering relevant threats, and to the study of their consequences [1,2,3]

  • Based on the correct research task, we introduce the following criteria for comparison with analogues based on the available functionality:

  • The conducted investigation was aimed at analyzing CyberPhysical Devices of a Smart Home (CPDoSH) MC in the interests of information security

Read more

Summary

Introduction

Information security, the relevance of which in the modern world is unconditional, affects many areas that relate to countering relevant threats, and to the study of their consequences [1,2,3]. After the accomplished fact of an attack on information resources, it is required to study how this attack was carried out, who was its initiator and what software and hardware was used. It is necessary to take into account the fact that traces of a cybercrime can be deliberately hidden by an attacker, thereby making it difficult to find and punish him [4]

Relevance
Novelty
Contribution
Content
Analysis of Existing Review Works
Ontological Model of the Subject Area and Research Stages
Research Progress
Discussion
Asteria
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call