EXPERIMENTAL RESEARCH, SOFTWARE IMPLEMENTATION AND EVALUATION OF THE EFFECTIVENESS OF THE APPLICATION OF THE SOFTWARE PROTECTION METHOD BASED ON HYBRID ANALYSIS

DOI: 10.31673/2409-7292.2025.030422

Authors

  • А. О. Гапон, (Gapon A.O.) Kharkiv National University of Radio Electronics

DOI:

https://doi.org/10.31673/2409-7292.2025.030422

Abstract

The growth of cyber threats, especially in the context of the active spread of malicious software, leads to serious
consequences, including unauthorized access to confidential systems, mass theft or loss of critical data, as well as their
encryption for the purpose of extortion. These events not only cause significant economic damage, but are also classified as
criminal offenses in many jurisdictions, which emphasizes their legal and social significance. In this context, software protection
has acquired strategic importance, especially at the stages of its development, when it is possible to proactively prevent potential
vulnerabilities. Modern methods of code analysis, in particular static and dynamic, demonstrate significant limitations in the
fight against polymorphic and metamorphic malware. Static analysis, based on signatures, is unable to effectively detect new
forms of threats due to the lag of virus databases and a high rate of false positives. Dynamic analysis, although it allows to
capture behavioral signs of malicious code, is resource-intensive, slows down the testing process and is sensitive to antiemulation techniques that hide the true nature of the threat. To overcome these problems, a hybrid code analysis method is
proposed, which synergistically combines the advantages of static, dynamic and semantic approaches. This approach provides
comprehensive threat detection based on simultaneous analysis of the code structure and its behavior during execution, which
significantly increases the accuracy of detection, reduces the number of false positives and provides a wider coverage of potential
risks. Of particular importance is its application for early detection of threats in widely used open-source libraries, where supply
chain risks are the highest. The implementation of hybrid analysis provides a significant increase in the overall level of software
security, optimization of testing costs, reduction of verification time and increased confidence in the results obtained. This
direction is especially relevant for large-scale projects with microservice architecture and intensive use of open-source components, where the need for reliable protection against evolving cyber threats is critically important. Thus, the development
and practical implementation of hybrid code analysis is of scientific and applied value in ensuring cyber resilience of modern
and promising information systems.
Keywords: malware, software protection, static code analysis, dynamic code analysis, hybrid code analysis, security
vulnerabilities, malicious patterns, polymorphic viruses, code security.

References
1. Захисний комплекс Microsoft / Що таке шкідливе програмне забезпечення? https://www.microsoft.
com/uk-ua/security/business/security-101/what-is-malware.
2. Python Type Checking. URL: https://testdriven.io/blog/python-typechecking/ (дата звернення 16.04.2024).
3. Delmas, D. (2022). Static analysis of program portability by abstract interpretation (Doctoral dissertation).
Sorbonne Université.
4. Generating and using a Callgraph, in Python. URL: https://cerfacs.fr/coop/pycallgraph (дата звернення
16.04.2024).
5. Data Flow Analysis. URL: https://www.codingninjas.com/studio/library/data-flow-analysis (дата звернення
16.04.2024).
6. Python Control Flow Statements and Loops. URL: https://pynative.com/python-control-flow-statements/ (дата
звернення 16.04.2024).
7. Akhtar, M. S., & Feng, T. (2022). Malware analysis and detection using machine learning algorithms.
Symmetry, 14(11), 2304. URL: https://doi.org/10.3390/sym14112304 (дата звернення 16.04.2024).
8. Monat, R., Ouadjaout, A., Miné, A. (2021). A Multilanguage Static Analysis of Python Programs with Native
C Extensions. In: Drăgoi, C., Mukherjee, S., Namjoshi, K. Static Analysis. SAS 2021. Lecture Notes in Computer
Science(), vol 12913. Springer, Cham. URL: https://doi.org/10.1007/978-3-030-88806-0_16.
9. Infographic Open source linters, tools for code analysis 2021. URL: https://www.promyze.com/open-sourcelinters-2021/ (дата звернення 16.04.2024).
10. Vassallo, C., Panichella, S., Palomba, F., et al. (2020). How developers engage with static analysis tools in
different contexts. Empirical Software Engineering, 25, 1419-1457.
11. B. Chess and G. McGraw, “Static analysis for security,” in IEEE Security & Privacy, vol. 2, no. 6, pp. 76-79,
Nov.-Dec. 2004, doi: 10.1109/MSP.2004.111.
12. Лаптєв, О. А., Колесник, В. В., Ровда, В. В., & Половінкін, М. І. Метод підвищення захисту особистих
даних за рахунок синтезу резильєнтних віртуальних спільнот. 2024. Сучасний захист інформації. 4(60). С. 141-
146. https://doi.org/10.31673/2409-7292.2024.040015.
13. Лаптєв О.А., Марченко В.В. Застосування завад для захисту інформації від витоку радіоканалом.
Сучасний захист інформації. 2025. №1. С.89-97. https://doi.org/10.31673/2409-7292.2025.013057.
14. Дробик О. В., Лаптєв О. А., Пархоменко І. І., Богуславська О. В., Пепа Ю. В., Пономаренко В. В.
Розпізнавання радіосигналів на основі апроксимації спектральної функції у базисі передатних функцій
резонансних ланок другого порядку. Сучасний захист інформації. 2024. №2. С.13-23. https://doi.org/
10.31673/2409-7292.2024.020002.
15. Аль-Дальваш А., Петченко М.В., Лаптєв О.А. Метод детектування цифрових радіосигналів за
допомогою диференціального перетворення. Сучасний захист інформації. 2025. №1. С.285-291. https://doi.org/
10.31673/2409-7292.2025.014329.

Published

2025-10-22

Issue

Section

Articles