Skip to main content

Trust Evaluation Method Based on the Degree of Code Obfuscation

  • Conference paper
  • First Online:
  • 1110 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13202))

Abstract

In the power grid environment, equipment certification is the key practice of zero trust security. Through the trust evaluation of equipment, the power grid environment can be effectively protected. This paper introduces identity authentication and behavior authentication to evaluate the security of devices from many aspects, and proposes a trust evaluation scheme based on code confusion for terminal devices. Through the identification and password technology and digital signature mechanism, the identity of terminal equipment is verified to prevent incomplete files caused by virus infection, Trojan horse/back door/man-made tampering, transmission failure and other reasons, and complete identity authentication. Through the improved trust evaluation model based on supervised learning to evaluate the effectiveness of code confusion, we can determine the ability of the code to resist malicious attacks, analyze whether the device will bring threatening behavior, indirectly verify the device behavior trust, and then prove the security of the terminal or software to complete behavior authentication.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Thakur, K., Qiu, M., Gai, K., Ali, M.: An investigation on cyber security threats and security models. In: IEEE CSCloud (2015)

    Google Scholar 

  2. Gai, K., Qiu, M., Sun, X., Zhao, H.: Security and privacy issues: a survey on FinTech. In: Qiu, M. (ed.) SmartCom 2016. LNCS, vol. 10135, pp. 236–247. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-52015-5_24

    Chapter  Google Scholar 

  3. Zhang, Z., Wu, J., et al.: Jamming ACK attack to wireless networks and a mitigation approach. In: IEEE GLOBECOM Conference, pp. 1–5 (2008)

    Google Scholar 

  4. Qiu, H., Qiu, M., Memmi, G., Ming, Z., Liu, M.: A dynamic scalable blockchain based communication architecture for IoT. In: Qiu, M. (ed.) SmartBlock 2018. LNCS, vol. 11373, pp. 159–166. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-05764-0_17

    Chapter  Google Scholar 

  5. Gai, K., Qiu, M., Elnagdy, S.: A novel secure big data cyber incident analytics framework for cloud-based cybersecurity insurance. In: IEEE BigDataSecurity (2016)

    Google Scholar 

  6. Qiu, H., Qiu, M., Lu, Z.: Selective encryption on ECG data in body sensor network based on supervised machine learning. Inf. Fusion 55, 59–67 (2020)

    Article  Google Scholar 

  7. Qiu, M., Liu, J., et al.: A novel energy-aware fault tolerance mechanism for wireless sensor networks. In: IEEE/ACM Conference on Green Computing and Communications (2011)

    Google Scholar 

  8. Qiu, L., Gai, K., Qiu, M.: Optimal big data sharing approach for tele-health in cloud computing. In: IEEE SmartCloud, pp. 184–189 (2016)

    Google Scholar 

  9. Martinelli, F., Mercaldo, F., Nardone, V., et al.: Evaluating model checking for cyber threats code obfuscation identification. J. Parallel Dist. Comput. 119, 203–218 (2018)

    Article  Google Scholar 

  10. Cho, T., Kim, H., Yi, J.H.: Security assessment of code obfuscation based on dynamic monitoring in android things. IEEE Access 5, 6361–6371 (2017)

    Article  Google Scholar 

  11. Zhao, B., Xiao, C., Zhang, Y., et al.: Assessment of recommendation trust for access control in open networks. Clust. Comput. 22(1), 565–571 (2019)

    Article  Google Scholar 

  12. Chrysikos, A., McGuire, S.: A predictive model for risk and trust assessment in cloud computing: taxonomy and analysis for attack pattern detection. In: Parkinson, S., Crampton, A., Hill, R. (eds.) Guide to Vulnerability Analysis for Computer Networks and Systems. Computer Communications and Networks, pp. 81–99. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-92624-7_4

    Chapter  Google Scholar 

  13. Rose, S.W., Borchert, O., Mitchell, S., Connelly, S.: Zero trust architecture (2020)

    Google Scholar 

  14. Samaniego, M., Deters, R.: Zero-trust hierarchical management in IoT. In: 2018 IEEE International Congress on Internet of Things (ICIOT), pp. 88–95. IEEE (2018)

    Google Scholar 

  15. Tan, F.: Research on continuous identity authentication based on user behavior. Chongqing University of Posts and Telecommunications(2019)

    Google Scholar 

  16. Zhao, Y., Tang, Z., Wang, N., Fang, D.Y., Yuan-Xiang, G.U.: Evaluation of code obfuscating transformation. J. Softw. 23(3), 700–711 (2012)

    Article  Google Scholar 

  17. Qing, S., Lin, Z., Lin, Z., Huang, J.: Code obfuscation effectiveness assessment model based on nonlinear fuzzy matrices. Comput. Sci. 46(4), 197–202 (2019)

    Google Scholar 

  18. Chen, Z., Tian, L., Lin, C.: Trust evaluation model of cloud user based on behavior data. Int. J. Distrib. Sens. Netw. 14(5), 1550147718776924 (2018)

    Google Scholar 

  19. Liu, Y., Gong, X., Feng, Y.: Trust system based on node behavior detection in internet of things. J. Commun. 35(05), 8–15 (2014)

    Google Scholar 

  20. Jiang, W., Wang, Y., Jiang, Y., et al.: Research on mobile Internet mobile agent system dynamic trust model for cloud computing. China Commun. 16(7), 174–194 (2019)

    Article  Google Scholar 

  21. Shi, L., Chen, N., Zhang, J.: Research on access trust technology of big data platform based on dynamic and continuous authentication of identity. Cyberspace Security 10(7), 12 (2020)

    Google Scholar 

  22. Wang, T., et al.: Mobile edge-enabled trust evaluation for the internet of things. Inf. Fusion 75, 90–100 (2021)

    Article  Google Scholar 

  23. Aagaard, M., AlTawy, R., Gong, G.: ACE: An authenticated encryption and hash algorithm. Submission to NIST-LWC, p. 8 (2019)

    Google Scholar 

  24. Chen, T., He, T., Benesty, M.: Xgboost: extreme gradient boosting. R Package Version 0.4-2 1(4), 1–4 (2015)

    Google Scholar 

  25. Wang, J., Wang, H., Zhang H.: Trust and attribute-based dynamic access control model for internet of things, pp. 342–345. IEEE (2017)

    Google Scholar 

  26. Misra, I., Maaten, L.: Self-supervised learning of pretext-invariant representations. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, pp. 6707–6717 (2020)

    Google Scholar 

Download references

Acknowledgment

This work is supported by the science and technology project of State Grid Corporation of China Funding Item: “Research on Dynamic Access Authentication and Trust Evaluation Technology of Power Mobile Internet Services Based on Zero Trust” (Grand No. 5700-202158183A-0-0-00) .

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lu Chen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chen, L., Dai, Z., Li, N., Li, Y. (2022). Trust Evaluation Method Based on the Degree of Code Obfuscation. In: Qiu, M., Gai, K., Qiu, H. (eds) Smart Computing and Communication. SmartCom 2021. Lecture Notes in Computer Science, vol 13202. Springer, Cham. https://doi.org/10.1007/978-3-030-97774-0_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-97774-0_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-97773-3

  • Online ISBN: 978-3-030-97774-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics