Abstract:
The rapid development of information technology in recent decades has led to a substantial increase in the source code of software, as well as its complexity. This fact points to the high complexity of the assessment of its compliance with the requirements of information security. An important point in this is to ensure reliability as the hardware component and software. Ensuring confidence in the software tools are often carried out in the absence, for whatever reasons of their source. The article deals with an approach to automate the identification of standardized algorithms for data conversion in accordance with their internal information links.
Keywords:identification algorithms; executable module; software; linear unit; slicing; information graph.