<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.3 20210610//EN" "JATS-journalpublishing1-3.dtd">
<article article-type="research-article" dtd-version="1.3" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xml:lang="ru"><front><journal-meta><journal-id journal-id-type="publisher-id">tuzsut</journal-id><journal-title-group><journal-title xml:lang="ru">Труды учебных заведений связи</journal-title><trans-title-group xml:lang="en"><trans-title>Proceedings of Telecommunication Universities</trans-title></trans-title-group></journal-title-group><issn pub-type="ppub">1813-324X</issn><issn pub-type="epub">2712-8830</issn><publisher><publisher-name>СПбГУТ</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="doi">10.31854/1813-324X-2023-9-1-105-115</article-id><article-id custom-type="elpub" pub-id-type="custom">tuzsut-443</article-id><article-categories><subj-group subj-group-type="heading"><subject>Research Article</subject></subj-group><subj-group subj-group-type="section-heading" xml:lang="ru"><subject>ИНФОРМАЦИОННЫЕ ТЕХНОЛОГИИ И ТЕЛЕКОММУНИКАЦИИ</subject></subj-group><subj-group subj-group-type="section-heading" xml:lang="en"><subject>INFORMATION TECHNOLOGIES AND TELECOMMUNICATION</subject></subj-group></article-categories><title-group><article-title>Иерархическая модель для проектирования систем на основе микроконтроллеров защищенными от киберфизических атак</article-title><trans-title-group xml:lang="en"><trans-title>Hierarchical Model for the Design of Microcontroller-Based Systems Protected from Cyber-Physical Attacks</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author" corresp="yes"><contrib-id contrib-id-type="orcid">https://orcid.org/0000-0003-1898-6624</contrib-id><name-alternatives><name name-style="eastern" xml:lang="ru"><surname>Левшун</surname><given-names>Д. С.</given-names></name><name name-style="western" xml:lang="en"><surname>Levshun</surname><given-names>D.</given-names></name></name-alternatives><bio xml:lang="ru"><p>старший научный сотрудник Санкт-Петербургского Федерального исследовательского центра Российской академии наук</p></bio><bio xml:lang="en"><p>St. Petersburg, Russian Federation</p></bio><email xlink:type="simple">levshun@comsec.spb.ru</email><xref ref-type="aff" rid="aff-1"/></contrib></contrib-group><aff-alternatives id="aff-1"><aff xml:lang="ru">Санкт-Петербургский Федеральный исследовательский центр Российской академии наук<country>Россия</country></aff><aff xml:lang="en">Saint-Petersburg Federal Research Center of the Russian Academy of Sciences<country>Russian Federation</country></aff></aff-alternatives><pub-date pub-type="collection"><year>2023</year></pub-date><pub-date pub-type="epub"><day>13</day><month>03</month><year>2023</year></pub-date><volume>9</volume><issue>1</issue><fpage>105</fpage><lpage>115</lpage><permissions><copyright-statement>Copyright &amp;#x00A9; Левшун Д.С., 2023</copyright-statement><copyright-year>2023</copyright-year><copyright-holder xml:lang="ru">Левшун Д.С.</copyright-holder><copyright-holder xml:lang="en">Levshun D.</copyright-holder><license license-type="creative-commons-attribution" xlink:href="https://creativecommons.org/licenses/by/4.0/" xlink:type="simple"><license-p>This work is licensed under a Creative Commons Attribution 4.0 License.</license-p></license></permissions><self-uri xlink:href="https://tuzs.sut.ru/jour/article/view/443">https://tuzs.sut.ru/jour/article/view/443</self-uri><abstract><p>В статье предложена иерархическая модель для проектирования систем на основе микроконтроллеров защищенными от киберфизических атак. В рамках данной модели система на основе микроконтроллеров представляется в виде иерархического реляционного множества взаимодействующих блоков с различными свойствами и связями между ними. Предложенная модель включает в себя модели аппаратных, программных и программно-аппаратных элементов, интерфейсов, протоколов и связей между элементами системы на различных ее уровнях, модели атакующего и атакующих действий. Ключевое отличие разработанной модели заключается в возможности представления систем на основе микроконтроллеров в целом, что позволяет нивелировать основной недостаток аналогов – проектирование систем на основе микроконтроллеров без учета взаимодействия их устройств друг с другом. Кроме того, разработанная модель является модульной и расширяемой, направлена на обеспечение защищенности проектируемого решения от киберфизических атак, а также рассматривает элементы защиты как неотъемлемую часть спроектированной системы.</p></abstract><trans-abstract xml:lang="en"><p>The article proposes a hierarchical model for the design of microcontroller-based systems protected from cyber-physical attacks. Within the framework of this model, a microcontroller-based system is represented as a hierarchical relational set of interacting building blocks with different properties and links between them. The proposed model includes models of hardware, software and hardware-software elements, interfaces, protocols and links between system elements, models of attacker and attack actions. The key difference of the developed model lies in the possibility of full representation of microcontroller-based systems, while other solutions have a drawback of designing such systems without taking into account the interactions of their devices with each other and other systems. In addition, the developed model is modular and extensible, aims to ensure the security of the designed solution from cyber-physical attacks, and considers security elements as an integral part of the final solution.</p></trans-abstract><kwd-group xml:lang="ru"><kwd>информационная безопасность</kwd><kwd>проектирование защищенных систем</kwd><kwd>система на основе микроконтроллеров</kwd><kwd>теоретико-множественная модель</kwd><kwd>киберфизическая атака</kwd><kwd>иерархическая модель</kwd></kwd-group><kwd-group xml:lang="en"><kwd>information security</kwd><kwd>secure by design</kwd><kwd>microcontroller-based system</kwd><kwd>set-theoretic approach</kwd><kwd>cyber-physical attack</kwd><kwd>hierarchical model</kwd></kwd-group><funding-group xml:lang="ru"><funding-statement>Исследование выполнено за счет гранта Российского Научного Фонда № 22-71-00107, https://rscf.ru/project/22-71-00107</funding-statement></funding-group><funding-group xml:lang="en"><funding-statement>The study was supported by the grant of the Russian Science Foundation No. 22-71-00107, https://rscf.ru/en/project/22-71-00107</funding-statement></funding-group></article-meta></front><back><ref-list><title>References</title><ref id="cit1"><label>1</label><citation-alternatives><mixed-citation xml:lang="ru">Левшун Д.С., Гайфулина Д.А., Чечулин А.А., Котенко И.В. Проблемные вопросы информационной безопасности киберфизических систем // Информатика и автоматизация. 2020. Т. 19. № 5. С. 1050‒1088. DOI:10.15622/ia.2020.19.5.6</mixed-citation><mixed-citation xml:lang="en">Levshun D., Gaifulina D., Chechulin A., Kotenko I. Problematic Issues of Information Security of Cyber-Physical Systems. Informatics and Automation. 2020;19(5):1050‒1088. (in Russ.) DOI:10.15622/ia.2020.19.5.6</mixed-citation></citation-alternatives></ref><ref id="cit2"><label>2</label><citation-alternatives><mixed-citation xml:lang="ru">Левшун Д.С., Чечулин А.А., Котенко И.В. Жизненный цикл разработки защищенных систем на основе встроенных устройств // Защита информации. Инсайд. 2017. № 4. С. 53‒59.</mixed-citation><mixed-citation xml:lang="en">Levshun D., Chechulin A., Kotenko I. Design lifecycle for secure cyber-physical systems based on embedded devices. Zaŝita informacii. Inside. 2017;4(76):53‒59. (in Russ.)</mixed-citation></citation-alternatives></ref><ref id="cit3"><label>3</label><citation-alternatives><mixed-citation xml:lang="ru">Котенко И.В., Чечулин А.А., Левшун Д.С. Анализ защищенности инфраструктуры железнодорожного транспорта на основе аналитического моделирования // Защита информации. Инсайд. 2017. № 6. С. 48‒57.</mixed-citation><mixed-citation xml:lang="en">Kotenko I., Chechulin A., Levshun D. Security analysis of railway transport infrastructure on the base of analytical modeling. Zaŝita informacii. Inside. 2017;6(78):48‒57. (in Russ.)</mixed-citation></citation-alternatives></ref><ref id="cit4"><label>4</label><citation-alternatives><mixed-citation xml:lang="ru">Левшун Д.С., Чечулин А.А., Котенко И.В. Комплексная модель защищенных киберфизических систем для их проектирования и верификации // Труды учебных заведений связи. 2019. Т. 5. № 4. С. 114‒123. DOI:10.31854/1813-324X-2019-5-4-114-123</mixed-citation><mixed-citation xml:lang="en">Levshun D., Chechulin A., Kotenko I. A Comprehensive Model of Secure Cyber-Physical Systems for their Design and Verification. Proc. of Telecom. Universities.  2019;5(4):114–123 (in Russ.) DOI:10.31854/1813-324X-2019-5-4-114-123</mixed-citation></citation-alternatives></ref><ref id="cit5"><label>5</label><citation-alternatives><mixed-citation xml:lang="ru">Левшун Д.С., Чечулин А.А., Котенко И.В. Проектирование безопасной среды передачи данных на примере протокола I2C // Защита информации. Инсайд. 2018. № 4. С. 54‒62.</mixed-citation><mixed-citation xml:lang="en">Levshun D., Chechulin A., Kotenko I. Design of Secure Data Transfer Environment Using the I2C Protocol as an Example. Zaŝita informacii. Inside. 2018;4(82):54‒62. (in Russ.)</mixed-citation></citation-alternatives></ref><ref id="cit6"><label>6</label><citation-alternatives><mixed-citation xml:lang="ru">Islam J., Habiba U., Kabir H., Martuza KG., Akter F., Hafiz F., et al. Design and Development of Microcontroller Based Wireless Humidity Monitor // IOSR Journal of Electrical and Electronics Engineering // 2018. Vol. 13. Iss. 2. PP. 41‒46. DOI:10.9790/1676-1302034146</mixed-citation><mixed-citation xml:lang="en">Islam J., Habiba U., Kabir H., Martuza KG., Akter F., Hafiz F., et al. Design and Development of Microcontroller Based Wireless Humidity Monitor. IOSR Journal of Electrical and Electronics Engineering. 2018;13(2):41‒46. DOI:10.9790/1676-1302034146</mixed-citation></citation-alternatives></ref><ref id="cit7"><label>7</label><citation-alternatives><mixed-citation xml:lang="ru">Sowah RA., Boahene DE., Owoh DC., Addo R., Mills G.A., Owusu-Banahene W., et al. Design of a Secure Wireless Home Automation System with an Open Home Automation Bus (OpenHAB 2) Framework // Journal of Sensors. 2020. Vol. 2020. PP. 1‒22. DOI:10.1155/2020/8868602</mixed-citation><mixed-citation xml:lang="en">Sowah RA., Boahene DE., Owoh DC., Addo R., Mills G.A., Owusu-Banahene W., et al. Design of a Secure Wireless Home Automation System with an Open Home Automation Bus (OpenHAB 2) Framework. Journal of Sensors. 2020;2020:1‒22. DOI:10.1155/2020/8868602</mixed-citation></citation-alternatives></ref><ref id="cit8"><label>8</label><citation-alternatives><mixed-citation xml:lang="ru">Tebueva F.B., Rosenko A.P., Nechvoloda V.E. Development of Methods and Software Modules Security Assessment Information of Limited Distribution // Proceedings of the Young Scientist's Third International Workshop on Trends in Information Processing (YSIP3 2019, Stavropol, Russia, 17‒20th September 2019). CEUR, 2019.</mixed-citation><mixed-citation xml:lang="en">Tebueva F.B., Rosenko A.P., Nechvoloda V.E. Development of Methods and Software Modules Security Assessment Information of Limited Distribution. Proceedings of the Young Scientist's Third International Workshop on Trends in Information Processing, YSIP3 2019, 17‒20th September 2019, Stavropol, Russia. CEUR; 2019.</mixed-citation></citation-alternatives></ref><ref id="cit9"><label>9</label><citation-alternatives><mixed-citation xml:lang="ru">Mutharasu S., Divya V., Bharathi D.K., Elakkiya M.V., Janani E. Design and implementation of agrobot by using IoT // International Journal of Advance Research, Ideas and Innovations in Technology. 2019. Vol. 5. Iss. 2. PP. 10‒13.</mixed-citation><mixed-citation xml:lang="en">Mutharasu S., Divya V., Bharathi D.K., Elakkiya M.V., Janani E. Design and implementation of agrobot by using IoT. International Journal of Advance Research, Ideas and Innovations in Technology. 2019;5(2):10‒13.</mixed-citation></citation-alternatives></ref><ref id="cit10"><label>10</label><citation-alternatives><mixed-citation xml:lang="ru">Kovtunenko A., Bilyalov A., Valeev S. Distributed Streaming Data Processing in IoT Systems Using Multiagent Soft-ware Architecture // Proceedings of the 18th International Conference on Next Generation Wired/Wireless Networking, NEW2AN 2018, and 11th Conference on Internet of Things, Smart Spaces, and Next Generation Networks and Systems, ruSMART 2018, (St. Petersburg, Russia, 27–29 August 2018). Lecture Notes in Computer Science. Vol. 11118. Cham: Springer, 2018. PP. 572‒583. DOI:10.1007/978-3-030-01168-0_51</mixed-citation><mixed-citation xml:lang="en">Kovtunenko A., Bilyalov A., Valeev S. Distributed Streaming Data Processing in IoT Systems Using Multi-agent Soft-ware Architecture. Proceedings of the 18th International Conference on Next Generation Wired/Wireless Networking, NEW2AN 2018, and 11th Conference on Internet of Things, Smart Spaces, and Next Generation Networks and Systems, ruSMART 2018, 27–29 August 2018, St. Petersburg, Russia. Lecture Notes in Computer Science. vol.11118. Cham: Springer; 2018. p.572‒583. DOI:10.1007/978-3-030-01168-0_51</mixed-citation></citation-alternatives></ref><ref id="cit11"><label>11</label><citation-alternatives><mixed-citation xml:lang="ru">Ceken C., Abdurahman D. Simulation Modeling of An IoT Based Cold Chain Logistics Management System // Sakarya University Journal of Computer and Information Sciences. 2019. Vol. 2. Iss. 2. PP. 89‒100. DOI:10.35377/saucis.02.02.598963</mixed-citation><mixed-citation xml:lang="en">Ceken C., Abdurahman D. Simulation Modeling of An IoT Based Cold Chain Logistics Management System. Sakarya University Journal of Computer and Information Sciences. 2019;2(2):89‒100. DOI:10.35377/saucis.02.02.598963</mixed-citation></citation-alternatives></ref><ref id="cit12"><label>12</label><citation-alternatives><mixed-citation xml:lang="ru">Ashouri M., Lorig F., Davidsson P., Spalazzese R. Edge Computing Simulators for IoT System Design: An Analysis of Qualities and Metrics // Future Internet. 2019. Vol. 11. Iss. 11. P. 235. DOI:10.3390/fi11110235</mixed-citation><mixed-citation xml:lang="en">Ashouri M., Lorig F., Davidsson P., Spalazzese R. Edge Computing Simulators for IoT System Design: An Analysis of Qualities and Metrics. Future Internet. 2019;11(11):235. DOI:10.3390/fi11110235</mixed-citation></citation-alternatives></ref><ref id="cit13"><label>13</label><citation-alternatives><mixed-citation xml:lang="ru">Giménez P., Molína B. Palau C.E., Esteve M. SWE Simulation and Testing for the IoT // Proceedings of the International Conference on Systems, Man, and Cybernetics (Manchester, UK, 13‒16 October 2013). IEEE, 2013. PP. 356‒361. DOI:10.1109/ SMC.2013.67</mixed-citation><mixed-citation xml:lang="en">Giménez P., Molína B. Palau C.E., Esteve M. SWE Simulation and Testing for the IoT. Proceedings of the International Conference on Systems, Man, and Cybernetics, 13‒16 October 2013, Manchester, UK. IEEE; 2013. PP. 356‒361. DOI:10.1109/SMC.2013.67</mixed-citation></citation-alternatives></ref><ref id="cit14"><label>14</label><citation-alternatives><mixed-citation xml:lang="ru">Andres-Maldonado P., Lauridsen M., Ameigeiras P., Lopez-Soler J.M. Analytical Modeling and Experimental Validation of NB-IoT Device Energy Consumption // IEEE Internet of Things Journal. 2019. Vol. 6. Iss. 3. PP. 5691‒5701. DOI:10.1109/JIOT.2019.2904802</mixed-citation><mixed-citation xml:lang="en">Andres-Maldonado P., Lauridsen M., Ameigeiras P., Lopez-Soler J.M. Analytical Modeling and Experimental Validation of NB-IoT Device Energy Consumption. IEEE Internet of Things Journal. 2019;6(3):5691‒5701. DOI:10.1109/JIOT.2019.2904802</mixed-citation></citation-alternatives></ref><ref id="cit15"><label>15</label><citation-alternatives><mixed-citation xml:lang="ru">Udoh S.J., Srivastava V.M. Analytical Modeling of Radio Network Performance for 5G (Non-Standalone) and It's Network Connectivity // Journal of Communications. 2020. Vol. 15. Iss. 12. PP. 886‒895. DOI:10.12720/jcm.15.12.886-895</mixed-citation><mixed-citation xml:lang="en">Udoh S.J., Srivastava V.M. Analytical Modeling of Radio Network Performance for 5G (Non-Standalone) and It's Network Connectivity. Journal of Communications. 2020;15(12):886‒895. DOI:10.12720/jcm.15.12.886-895</mixed-citation></citation-alternatives></ref><ref id="cit16"><label>16</label><citation-alternatives><mixed-citation xml:lang="ru">Bhavana A., Nandha Kumar A.N. An Analytical Modeling for Leveraging Scalable Communication in IoT for Inter-Domain Routing // Proceedings of the Computational Methods in Systems and Software (CoMeSySo 2018, 12‒14 September 2018). Advances in Intelligent Systems and Computing. Vol. 859. Cham: Springer, 2018. PP. 1‒11. DOI:10.1007/978-3-030-00211-4_1</mixed-citation><mixed-citation xml:lang="en">Bhavana A., Nandha Kumar A.N. An Analytical Modeling for Leveraging Scalable Communication in IoT for Inter-Domain Routing. Proceedings of the Computational Methods in Systems and Software, CoMeSySo 2018, 12‒14 September 2018. Advances in Intelligent Systems and Computing. vol.859. Cham: Springer; 2018. p.1‒11. DOI:10.1007/978-3-030-00211-4_1</mixed-citation></citation-alternatives></ref><ref id="cit17"><label>17</label><citation-alternatives><mixed-citation xml:lang="ru">Hu F., Lu Y., Vasilakos A.V., Hao Q., Ma R., Patil Y., et al. Robust Cyber–Physical Systems: Concept, models, and implementation // Future Generation Computer Systems. 2016. Vol. 56. PP. 449‒475. DOI:10.1016/j.future.2015.06.006</mixed-citation><mixed-citation xml:lang="en">Hu F., Lu Y., Vasilakos A.V., Hao Q., Ma R., Patil Y., et al. Robust Cyber–Physical Systems: Concept, models, and implementation. Future Generation Computer Systems. 2016;56:449‒475. DOI:10.1016/j.future.2015.06.006</mixed-citation></citation-alternatives></ref><ref id="cit18"><label>18</label><citation-alternatives><mixed-citation xml:lang="ru">Penas O., Plateaux R., Patalano S., Hammadi M. Multi-scale approach from mechatronic to Cyber-Physical Systems for the design of manufacturing systems // Computers in Industry. 2017. Vol. 86. PP. 52‒69. DOI:10.1016/j.compind.2016.12.001</mixed-citation><mixed-citation xml:lang="en">Penas O., Plateaux R., Patalano S., Hammadi M. Multi-scale approach from mechatronic to Cyber-Physical Systems for the design of manufacturing systems. Computers in Industry. 2017;86:52‒69. DOI:10.1016/j.compind.2016.12.001</mixed-citation></citation-alternatives></ref><ref id="cit19"><label>19</label><citation-alternatives><mixed-citation xml:lang="ru">Scott-Hayward S. Design and deployment of secure, robust, and resilient SDN controllers // Proceedings of the 1st Conference on Network Softwarization (London, UK, 13‒17 April 2015). IEEE, 2015. PP. 1‒5. DOI:10.1109/NETSOFT.2015.7258233</mixed-citation><mixed-citation xml:lang="en">Scott-Hayward S. Design and deployment of secure, robust, and resilient SDN controllers. Proceedings of the 1st Conference on Network Softwarization, NetSoft, 13‒17 April 2015, London, UK. IEEE; 2015. p.1‒5. DOI:10.1109/NETSOFT.2015.7258233</mixed-citation></citation-alternatives></ref><ref id="cit20"><label>20</label><citation-alternatives><mixed-citation xml:lang="ru">Hu F., Hao Q., Bao K. A Survey on Software-Defined Network and OpenFlow: From Concept to Implementation // IEEE Communications Surveys &amp; Tutorials. 2014. Vol. 16. Iss. 4. PP. 2181‒2206. DOI:10.1109/COMST.2014.2326417</mixed-citation><mixed-citation xml:lang="en">Hu F., Hao Q., Bao K. A Survey on Software-Defined Network and OpenFlow: From Concept to Implementation. IEEE Communications Surveys &amp; Tutorials. 2014;16(4):2181‒2206. DOI:10.1109/COMST.2014.2326417</mixed-citation></citation-alternatives></ref><ref id="cit21"><label>21</label><citation-alternatives><mixed-citation xml:lang="ru">Lin Z., Yu S., Lü J., Cai S., Chen G. Design and ARM-Embedded Implementation of a Chaotic Map-Based Real-Time Secure Video Communication System // IEEE Transactions on Circuits and Systems for Video Technology. 2014. Vol. 25. Iss. 7. PP. 1203‒1216. DOI:10.1109/TCSVT.2014.2369711</mixed-citation><mixed-citation xml:lang="en">Lin Z., Yu S., Lü J., Cai S., Chen G. Design and ARM-Embedded Implementation of a Chaotic Map-Based Real-Time Secure Video Communication System. IEEE Transactions on Circuits and Systems for Video Technology. 2014;25(7):1203‒1216. DOI:10.1109/TCSVT.2014.2369711</mixed-citation></citation-alternatives></ref><ref id="cit22"><label>22</label><citation-alternatives><mixed-citation xml:lang="ru">National Institute of Standards and Technology // NIST. URL: https://www.nist.gov (дата обращения 3.02.2023)</mixed-citation><mixed-citation xml:lang="en">NIST. National Institute of Standards and Technology. URL: https://www.nist.gov [Accessed 3rd February 2023]</mixed-citation></citation-alternatives></ref><ref id="cit23"><label>23</label><citation-alternatives><mixed-citation xml:lang="ru">Desnitsky V., Kotenko I., Chechulin A. Configuration-based approach to embedded device security // Proceedings of the 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security (MMM-ACNS 2012, St. Petersburg, Russia, 17‒19 October 2012). Lecture Notes in Computer Science. Vol. 7531. Berlin, Heidelberg: Springer, 2012. PP. 270‒285. DOI:10.1007/978-3-642-33704-8_23</mixed-citation><mixed-citation xml:lang="en">Desnitsky V., Kotenko I., Chechulin A. Configuration-based approach to embedded device security. Proceedings of the 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, 17‒19 October 2012, St. Petersburg, Russia. Lecture Notes in Computer Science. vol.7531. Berlin, Heidelberg: Springer; 2012. p.270‒285. DOI:10.1007/978-3-642-33704-8_23</mixed-citation></citation-alternatives></ref><ref id="cit24"><label>24</label><citation-alternatives><mixed-citation xml:lang="ru">UML Profile for MARTE: Modeling and Analysis of Real-Time Embedded Systems. 2011. URL: https://www.omg.org/spec/MARTE/1.1/PDF (дата обращения 3.02.2023)</mixed-citation><mixed-citation xml:lang="en">UML Profile for MARTE: Modeling and Analysis of Real-Time Embedded Systems. 2011. URL: https://www.omg.org/spec/MARTE/1.1/PDF [Accessed 3rd February 2023]</mixed-citation></citation-alternatives></ref><ref id="cit25"><label>25</label><citation-alternatives><mixed-citation xml:lang="ru">Chechulin A., Kotenko I., Desnitsky V. An Approach for Network Information Flow Analysis for Systems of Embedded Components // Proceedings of the 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security (MMM-ACNS 2012, St. Petersburg, Russia, 17‒19 October 2012). Lecture Notes in Computer Science. Vol. 7531. Berlin, Heidelberg: Springer, 2012. PP. 146‒155. DOI:10.1007/978-3-642-33704-8_13</mixed-citation><mixed-citation xml:lang="en">Chechulin A., Kotenko I., Desnitsky V. An Approach for Network Information Flow Analysis for Systems of Embedded Components. Proceedings of the 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, 17‒19 October 2012, St. Petersburg, Russia. Lecture Notes in Computer Science. vol.7531. Berlin, Heidelberg: Springer; 2012. p.146‒155. DOI:10.1007/978-3-642-33704-8_13</mixed-citation></citation-alternatives></ref><ref id="cit26"><label>26</label><citation-alternatives><mixed-citation xml:lang="ru">Design of Secure and Energy-Efficient Embedded Systems for Future Internet Applications // CORDIS. URL: https://cordis.europa.eu/project/id/256668 (дата обращения 3.02.2023)</mixed-citation><mixed-citation xml:lang="en">CORDIS. Design of Secure and Energy-Efficient Embedded Systems for Future Internet Applications. URL: https://cordis.europa.eu/project/id/256668 [Accessed 3rd February 2023]</mixed-citation></citation-alternatives></ref></ref-list><fn-group><fn fn-type="conflict"><p>The authors declare that there are no conflicts of interest present.</p></fn></fn-group></back></article>
