DocumentCode :
2281883
Title :
Establishing trust in black-box programs
Author :
Xia, Ying ; Fairbanks, Kevin ; Owen, Henry
Author_Institution :
Sch. of Electr. & Comput. Eng., Georgia Inst. of Technol., Atlanta, GA
fYear :
2007
fDate :
22-25 March 2007
Firstpage :
462
Lastpage :
465
Abstract :
Encrypted binaries are increasingly being used as deterrence for software piracy as well as vulnerability exploitation. The application of encrypted programs, however, leads to increased security concerns, as users are unable to identify malicious behavior by monitoring the encrypted executables. This paper proposes a method to monitor encrypted programs that assures users that the black-box program on their system is not violating any security concerns. Our approach is to embed a system call monitoring tool into the operating system that monitors system call content for suspicious behavior or the lack thereof.
Keywords :
computer crime; cryptography; black-box programs; encrypted binaries; encrypted executables; encrypted programs; malicious behavior; operating system; software piracy; suspicious behavior; system call content; system call monitoring tool; vulnerability exploitation; Application software; Computer crime; Computer hacking; Computer industry; Computerized monitoring; Cryptography; Operating systems; Protection; Security; Viruses (medical);
fLanguage :
English
Publisher :
ieee
Conference_Titel :
SoutheastCon, 2007. Proceedings. IEEE
Conference_Location :
Richmond, VA
Print_ISBN :
1-4244-1028-2
Electronic_ISBN :
1-4244-1029-0
Type :
conf
DOI :
10.1109/SECON.2007.342945
Filename :
4147475
Link To Document :
بازگشت