Title :
Program Security Inspection: Model and Implementation
Author :
Zemao Chen ; Xiaoping Wu ; Weimin Tang
Author_Institution :
Dept. of Inf. Security, Naval Univ. of Eng., Wuhan
Abstract :
Current approaches for malicious code defense are mostly signature-scanning and execution-monitoring. Limited by the undecidability of malicious codes, they can´t defend against unknown attacks effectively. This paper investigates an integrity measurement and access control combined program security inspection model. On initial system setup, it indexes all known and trusted programs by both the identifiers and the integrity signatures of them in a white list (WL). During system running time, it measures integrity signature of each program file to be loaded and verifies it with WL. By disallowing unknown or unexpectedly modified programs from running, the model guarantees that only trusted programs can be invoked. Not relying on signatures of malicious codes, it is not limited by their undecidability and therefore is able to combat both known and unknown attacks with no false results. The model is implemented in Windows 2000/XP with neither source code nor binary level modifications to the Windows OS is required by using the technology of kernel mode file system filter driver. To improve the usability of the implementation, an administrative utility is created to censor new programs which came after the initial system setup. Those from trusted origins and not altered after release are thought to be secure and are added to WL for them to work normally.
Keywords :
authorisation; data integrity; digital signatures; program verification; system monitoring; access control rule; execution-monitoring approach; malicious code defense; malicious code undecidability; program integrity signature measurement; program security inspection model; signature-scanning approach; system running time; trusted program file verification; white list; Access control; Computer security; Context modeling; Data security; Databases; Filters; Information security; Inspection; Operating systems; Protection;
Conference_Titel :
Wireless Communications, Networking and Mobile Computing, 2008. WiCOM '08. 4th International Conference on
Conference_Location :
Dalian
Print_ISBN :
978-1-4244-2107-7
Electronic_ISBN :
978-1-4244-2108-4
DOI :
10.1109/WiCom.2008.2933