Method and algorithms of visual audit of program interaction

Mikhail V. Buinevich
1,3, Konstantin E. Izrailov2,3+, Igor V. Kotenko2, and Pavel A. Kurta3
 

1Saint-Petersburg University of State Fire Service of EMERCOM of Russia, Saint-Petersburg, Russia
bmv1958@yandex.ru

2St. Petersburg Federal Research Center of the Russian Academy of Sciences, Saint-Petersburg, Russia

konstantin.izrailov@mail.ru, ivkote@comsec.spb.ru

3The Bonch-Bruevich State University of Telecommunications, Saint-Petersburg, Russia

expert@kurta.ru

 

Abstract

Modern software products consist of a lot of executable files. Simultaneously, there are complex data flows between them. As a result, the task of auditing such data interactions of programs arises. In particular, this can be in demand in the field of information security for detecting holes in architectures of solutions. Such types of programs as PE (for Windows), ELF (for Linux), CIL (.Net bite code), JBC (Java bite code) and Script (interpretable code) should be mentioned. The types of interactions include direct program fetching, direct import of libraries and exchange of external files. The paper discusses the authors’ own method of analysing software products and visualizing the interaction of programs to be studied by the Expert subsequently. The work of the method is based on the generalized model of interactions set analytically. The authors describe the results of the experiment with the developed prototype, implementing this method for five standardized and qualitatively different software products. The results of the experiment are analyzed by the expert from the point of view of product information security. A conclusion is made about the necessity of automatizing the expert’s work. For this purpose, we propose the corresponding algorithms as the pseudo-code.

Keywords: Software, Interaction, Audit, Visualization, Information Security

 

+: Corresponding author: The Bonch-Bruevich State University of Telecommunications, Saint-Petersburg, Russia,
Tel: +79215582389, Email: konstantin.izrailov@mail.ru

 

Journal of Internet Services and Information Security (JISIS), 11(1): 16-43, February 2021

Received: December 3, 2020; Accepted: February 11, 2021; Published: February 28, 2021

DOI: 10.22667/JISIS.2021.02.28.016 [pdf]