Vestnik of Astrakhan State Technical University. Series: Management, Computer Sciences and Informatics
RUS  ENG    JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB  
General information
Latest issue
Archive
Impact factor

Search papers
Search references

RSS
Latest issue
Current issues
Archive issues
What is RSS



Vestn. Astrakhan State Technical Univ. Ser. Management, Computer Sciences and Informatics:
Year:
Volume:
Issue:
Page:
Find






Personal entry:
Login:
Password:
Save password
Enter
Forgotten password?
Register


Vestnik of Astrakhan State Technical University. Series: Management, Computer Sciences and Informatics, 2020, Number 1, Pages 50–56
DOI: https://doi.org/10.24143/2072-9502-2020-1-50-56
(Mi vagtu615)
 

This article is cited in 1 scientific paper (total in 1 paper)

COMPUTER SOFTWARE AND COMPUTING EQUIPMENT

Approach to assessment of firmware security under fuzzy input data

A. N. Iuganson, D. A. Zakoldaev

ITMO University, Saint-Petersburg, Russian Federation
Full-text PDF (288 kB) Citations (1)
References:
Abstract: The article highlights the issues of security and software security, which turn to be secondary in the design and development of software tools in order to please the speedy launch of the software product on the market. Due to the fact that the cost of eliminating security defects is higher in the late stages of design, the scientific problem of assessing software security under high uncertainty has been considered. The functional requirements for security of the firmware are given. A new approach is proposed for assessing the firmware security. The subject of research is a firmware designed to control various devices and microcontrollers. Based on GOST R 56939-2016 “Information security. Secure software development. General requirements” there have been developed the security requirements (qualitative and quantitative) for the embedded software, the assessment of which allows determining the level of security of the firmware as a whole. The fuzzy logic apparatus was used to optimize the assessment process in conditions of possible uncertainty, inconsistency, incompleteness and qualitative nature of the input data. The proposed method will help minimize the economic risks at the stages of operation and maintenance of embedded systems.
Keywords: firmware, fuzzy logic, software security, software vulnerability.
Received: 18.12.2019
Document Type: Article
UDC: 004.056
Language: Russian
Citation: A. N. Iuganson, D. A. Zakoldaev, “Approach to assessment of firmware security under fuzzy input data”, Vestn. Astrakhan State Technical Univ. Ser. Management, Computer Sciences and Informatics, 2020, no. 1, 50–56
Citation in format AMSBIB
\Bibitem{IugZak20}
\by A.~N.~Iuganson, D.~A.~Zakoldaev
\paper Approach to assessment of firmware security under fuzzy input data
\jour Vestn. Astrakhan State Technical Univ. Ser. Management, Computer Sciences and Informatics
\yr 2020
\issue 1
\pages 50--56
\mathnet{http://mi.mathnet.ru/vagtu615}
\crossref{https://doi.org/10.24143/2072-9502-2020-1-50-56}
Linking options:
  • https://www.mathnet.ru/eng/vagtu615
  • https://www.mathnet.ru/eng/vagtu/y2020/i1/p50
  • This publication is cited in the following 1 articles:
    Citing articles in Google Scholar: Russian citations, English citations
    Related articles in Google Scholar: Russian articles, English articles
    Вестник Астраханского государственного технического университета. Серия: Управление, вычислительная техника и информатика
    Statistics & downloads:
    Abstract page:127
    Full-text PDF :92
    References:9
     
      Contact us:
     Terms of Use  Registration to the website  Logotypes © Steklov Mathematical Institute RAS, 2024