DocumentCode :
501422
Title :
An Approach for Sensitive Binary File Protection
Author :
JunKai, Gu ; Weiyong, Ji
Author_Institution :
Coll. of Geol. Eng. & Geomatics, Chang´´an Univ., Xi´´an, China
Volume :
1
fYear :
2009
fDate :
15-17 May 2009
Firstpage :
716
Lastpage :
718
Abstract :
When a host computer is attacked, files in the host computer are more or less unauthorizedly modified so as to achieve attacker\´s goal. Based on trusted computing technology, we present a trusted computer based approach for sensitive binary files protection. Different from traditional methods, our approach does not based on "condition-code", "intrusion-rule" and so on. It is checksum-based: each time before a sensitive binary filepsilas running, the kernel captures its running request first. And then the kernel calculates and compares its current hash, for example, SHA-1, against the expected one stored in the trusted platform module (TPM) in advance. If the comparison passes, the running request granted. Otherwise denied and the maliciously tampered file will be automatically recovered.
Keywords :
security of data; host computer; sensitive binary file protection; trusted computing technology; trusted platform module; Application software; Computer hacking; Data security; Educational institutions; Fingerprint recognition; Geology; Hardware; Information technology; Kernel; Protection; TPM5; file protection; trusted computing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Technology and Applications, 2009. IFITA '09. International Forum on
Conference_Location :
Chengdu
Print_ISBN :
978-0-7695-3600-2
Type :
conf
DOI :
10.1109/IFITA.2009.568
Filename :
5231752
Link To Document :
بازگشت