Title :
Establishing trust in black-box programs
Author :
Xia, Ying ; Fairbanks, Kevin ; Owen, Henry
Author_Institution :
Sch. of Electr. & Comput. Eng., Georgia Inst. of Technol., Atlanta, GA
Abstract :
Encrypted binaries are increasingly being used as deterrence for software piracy as well as vulnerability exploitation. The application of encrypted programs, however, leads to increased security concerns, as users are unable to identify malicious behavior by monitoring the encrypted executables. This paper proposes a method to monitor encrypted programs that assures users that the black-box program on their system is not violating any security concerns. Our approach is to embed a system call monitoring tool into the operating system that monitors system call content for suspicious behavior or the lack thereof.
Keywords :
computer crime; cryptography; black-box programs; encrypted binaries; encrypted executables; encrypted programs; malicious behavior; operating system; software piracy; suspicious behavior; system call content; system call monitoring tool; vulnerability exploitation; Application software; Computer crime; Computer hacking; Computer industry; Computerized monitoring; Cryptography; Operating systems; Protection; Security; Viruses (medical);
Conference_Titel :
SoutheastCon, 2007. Proceedings. IEEE
Conference_Location :
Richmond, VA
Print_ISBN :
1-4244-1028-2
Electronic_ISBN :
1-4244-1029-0
DOI :
10.1109/SECON.2007.342945