ENTERPRISE INFORMATION SECURITY MANAGEMENT SYSTEM BASED ON THE MODERN OBFUSCATION TECHNIQUE

In today's realities, with constantly developing information technologies (IoT, 5G, Big Data, Cloud technologies, etc.), software protection is an urgent issue in the field of information security for each small, medium, or big enterprise. The software is the intellectual property of both larg...

Full description

Bibliographic Details
Main Authors: Oleh Polihenko, Roman Odarchenko, Sergiy Gnatyuk
Format: Article
Language:English
Published: Consilium LLC 2020-07-01
Series:European Cooperation
Subjects:
Online Access:http://european-cooperation.eu/index.php/EC/article/view/88
id doaj-b7c4c03ea4fb41ba83bde92888fe428c
record_format Article
spelling doaj-b7c4c03ea4fb41ba83bde92888fe428c2020-11-25T03:19:23ZengConsilium LLCEuropean Cooperation2449-73202545-34832020-07-0134710.32070/ec.v3i47.88ENTERPRISE INFORMATION SECURITY MANAGEMENT SYSTEM BASED ON THE MODERN OBFUSCATION TECHNIQUEOleh Polihenko0Roman Odarchenko1Sergiy Gnatyuk2National Aviation UniversityNational Aviation UniversityNational Aviation University In today's realities, with constantly developing information technologies (IoT, 5G, Big Data, Cloud technologies, etc.), software protection is an urgent issue in the field of information security for each small, medium, or big enterprise. The software is the intellectual property of both large corporations and small companies. The low reliability of software protection for enterprises is associated with a rather complex and time-consuming process, as well as with a number of technical limitations, which contributes to the thriving of computer piracy, inflicts colossal losses on IT companies and, of course, the state as a whole. Therefore, the development of a new effective method of software protection, for the moment, is a priority in the field of information security, and new methods and techniques of software protection are needed for specialized companies, which develop paid software. Nowadays there are many different approaches to solving this problem. These are encryption, watermarking, etc., but no one gives guaranteed results. That's why modern companies engaged in software development, should provide their customers with a more secure information product. In this paper, the authors have provided the improved, more effective obfuscation method, based on a new sequence of obfuscation transformations. This method allows providing software protection of the enterprises from reverse engineering. To ensure the effectiveness of the proposed method, the authors have developed a special software product, based on cycles of operation and the creation of pseudocode to protect other software products. In the process of writing this article, studies were conducted that showed the following results. The product has become approximately 1.4 times more secure, and the obfuscation rate has increased by 10 percent. Based on the foregoing, the developed method can be followed to complicate the decoding process of existing software products used in various enterprises. In the future, it is planned to implement additional obfuscation transformations, as well as a comparative analysis with existing obfuscation programs. http://european-cooperation.eu/index.php/EC/article/view/88enterprisesecurity management systeminformation securityobfuscationsoftwaresecure coding
collection DOAJ
language English
format Article
sources DOAJ
author Oleh Polihenko
Roman Odarchenko
Sergiy Gnatyuk
spellingShingle Oleh Polihenko
Roman Odarchenko
Sergiy Gnatyuk
ENTERPRISE INFORMATION SECURITY MANAGEMENT SYSTEM BASED ON THE MODERN OBFUSCATION TECHNIQUE
European Cooperation
enterprise
security management system
information security
obfuscation
software
secure coding
author_facet Oleh Polihenko
Roman Odarchenko
Sergiy Gnatyuk
author_sort Oleh Polihenko
title ENTERPRISE INFORMATION SECURITY MANAGEMENT SYSTEM BASED ON THE MODERN OBFUSCATION TECHNIQUE
title_short ENTERPRISE INFORMATION SECURITY MANAGEMENT SYSTEM BASED ON THE MODERN OBFUSCATION TECHNIQUE
title_full ENTERPRISE INFORMATION SECURITY MANAGEMENT SYSTEM BASED ON THE MODERN OBFUSCATION TECHNIQUE
title_fullStr ENTERPRISE INFORMATION SECURITY MANAGEMENT SYSTEM BASED ON THE MODERN OBFUSCATION TECHNIQUE
title_full_unstemmed ENTERPRISE INFORMATION SECURITY MANAGEMENT SYSTEM BASED ON THE MODERN OBFUSCATION TECHNIQUE
title_sort enterprise information security management system based on the modern obfuscation technique
publisher Consilium LLC
series European Cooperation
issn 2449-7320
2545-3483
publishDate 2020-07-01
description In today's realities, with constantly developing information technologies (IoT, 5G, Big Data, Cloud technologies, etc.), software protection is an urgent issue in the field of information security for each small, medium, or big enterprise. The software is the intellectual property of both large corporations and small companies. The low reliability of software protection for enterprises is associated with a rather complex and time-consuming process, as well as with a number of technical limitations, which contributes to the thriving of computer piracy, inflicts colossal losses on IT companies and, of course, the state as a whole. Therefore, the development of a new effective method of software protection, for the moment, is a priority in the field of information security, and new methods and techniques of software protection are needed for specialized companies, which develop paid software. Nowadays there are many different approaches to solving this problem. These are encryption, watermarking, etc., but no one gives guaranteed results. That's why modern companies engaged in software development, should provide their customers with a more secure information product. In this paper, the authors have provided the improved, more effective obfuscation method, based on a new sequence of obfuscation transformations. This method allows providing software protection of the enterprises from reverse engineering. To ensure the effectiveness of the proposed method, the authors have developed a special software product, based on cycles of operation and the creation of pseudocode to protect other software products. In the process of writing this article, studies were conducted that showed the following results. The product has become approximately 1.4 times more secure, and the obfuscation rate has increased by 10 percent. Based on the foregoing, the developed method can be followed to complicate the decoding process of existing software products used in various enterprises. In the future, it is planned to implement additional obfuscation transformations, as well as a comparative analysis with existing obfuscation programs.
topic enterprise
security management system
information security
obfuscation
software
secure coding
url http://european-cooperation.eu/index.php/EC/article/view/88
work_keys_str_mv AT olehpolihenko enterpriseinformationsecuritymanagementsystembasedonthemodernobfuscationtechnique
AT romanodarchenko enterpriseinformationsecuritymanagementsystembasedonthemodernobfuscationtechnique
AT sergiygnatyuk enterpriseinformationsecuritymanagementsystembasedonthemodernobfuscationtechnique
_version_ 1724622655897731072