METHOD FOR AUTOMATED TESTING OF SOFTWARE AND HARDWARE SYSTEMS AND COMPLEXES Russian patent published in 2020 - IPC G06F21/57 G06F11/36 G06F17/50 

Abstract RU 2715025 C2

FIELD: calculating; counting.

SUBSTANCE: invention relates to computer engineering. Technical result is achieved by a method of testing a system of software and hardware by an automated design system, in which modules of an automated design system: obtaining a formalized description of the architecture of the tested system and constructing a use model which includes: type of use of the system, a system element, a method for realizing said use; obtaining from a threat base a formalized description of known threats for systems similar to the tested one and constructing a threat model of the same type as the use model which includes: a threat type, a system element, a method for realizing a threat, a vector of effecting the system; comparing threat model with use model; detecting means of the tested system, which are vulnerable: to the type of unauthorized use of the system, to the method of realizing the threat, to the vector of action on the system.

EFFECT: technical result consists in providing detection of vulnerable software and hardware in the process of automated testing of a system of software and hardware.

15 cl, 9 dwg

Similar patents RU2715025C2

Title Year Author Number
METHOD OF AUTOMATED DESIGN ENGENEERING OF HARDWARE AND SOFTWARE SYSTEMS AND COMPLEXES 2017
  • Dukhvalov Andrej Petrovich
  • Rudina Ekaterina Aleksandrovna
  • Kort Semen Stanislavovich
  • Zolotnikov Vyacheslav Nikolaevich
RU2659740C1
METHOD AND SYSTEM FOR AUTOMATED DOCUMENTATION OF SECURITY THREATS AND VULNERABILITIES RELATED TO AN INFORMATION RESOURCE 2022
  • Lebedev Sergej Vyacheslavovich
  • Savin Mikhail Valerevich
RU2789990C1
METHOD OF CONTROLLING PROTECTION SURFACE OF CORPORATE COMMUNICATION NETWORK 2023
  • Dobryshin Mikhail Mikhailovich
RU2824314C1
STRATEGIES TO STUDY VULNERABILITIES AND TO SUPPRESS VULNERABILITIES CAUSED BY CAPTURING ACCOUNT DATA 2007
  • Dungan Dzhon
  • Khartrehll Gregori D.
  • Sajmon Dehniel R.
RU2462753C2
METHOD FOR ASSIGNING AN UNKNOWN DEVICE TO A CLUSTER 2019
  • Ivanov Dmitrij Gennadevich
  • Ladikov Andrej Vladimirovich
  • Filonov Pavel Vladimirovich
RU2747466C2
METHOD FOR FORMING DEVICE CLUSTERS 2019
  • Ivanov Dmitrij Gennadevich
  • Ladikov Andrej Vladimirovich
  • Filonov Pavel Vladimirovich
RU2747452C2
METHOD FOR DETECTING COUPLED CLUSTERS 2019
  • Ivanov Dmitrij Gennadevich
  • Ladikov Andrej Vladimirovich
  • Filonov Pavel Vladimirovich
RU2747451C2
METHOD OF ASSESSING EFFICIENCY OF PHYSICAL SECURITY SYSTEM OF IMPORTANT PUBLIC FACILITY 2019
  • Gavrilov Petr Mikhajlovich
  • Slyusarev Andrej Viktorovich
  • Momot Andrej Ivanovich
  • Zaloga Nikolaj Vladimirovich
  • Moiseev Petr Nikolaevich
  • Bukovetskij Anton Vyacheslavovich
  • Yudin Arsenij Mikhajlovich
  • Barakov Boris Nikolaevich
RU2724909C1
SOFTWARE AND HARDWARE COMPLEX OF THE DECISION SUPPORT SYSTEM FOR MANAGING THE RELAY PROTECTION SUBSYSTEM AND AUTOMATION OF A DIGITAL SUBSTATION IN THE CONDITIONS OF COMPUTER ATTACKS AGAINST IT 2022
  • Karantaev Vladimir Gennadevich
  • Karpenko Vladislav Igorevich
RU2798437C1
METHOD FOR IDENTIFYING SOFTWARE VULNERABILITIES FORMING THE CONDITIONS FOR INFORMATION SECURITY VIOLATION IN AN INFORMATION SYSTEM DUE TO A COMPUTER ATTACK 2021
  • Butrik Ekaterina Evgenevna
  • Solovev Sergej Veniaminovich
  • Enyutin Aleksej Yurevich
RU2783224C1

RU 2 715 025 C2

Authors

Dukhvalov Andrej Petrovich

Rudina Ekaterina Aleksandrovna

Kort Semen Stanislavovich

Zolotnikov Vyacheslav Nikolaevich

Dates

2020-02-21Published

2018-04-19Filed