Title :
An Approach for Sensitive Binary File Protection
Author :
JunKai, Gu ; Weiyong, Ji
Author_Institution :
Coll. of Geol. Eng. & Geomatics, Chang´´an Univ., Xi´´an, China
Abstract :
When a host computer is attacked, files in the host computer are more or less unauthorizedly modified so as to achieve attacker\´s goal. Based on trusted computing technology, we present a trusted computer based approach for sensitive binary files protection. Different from traditional methods, our approach does not based on "condition-code", "intrusion-rule" and so on. It is checksum-based: each time before a sensitive binary filepsilas running, the kernel captures its running request first. And then the kernel calculates and compares its current hash, for example, SHA-1, against the expected one stored in the trusted platform module (TPM) in advance. If the comparison passes, the running request granted. Otherwise denied and the maliciously tampered file will be automatically recovered.
Keywords :
security of data; host computer; sensitive binary file protection; trusted computing technology; trusted platform module; Application software; Computer hacking; Data security; Educational institutions; Fingerprint recognition; Geology; Hardware; Information technology; Kernel; Protection; TPM5; file protection; trusted computing;
Conference_Titel :
Information Technology and Applications, 2009. IFITA '09. International Forum on
Conference_Location :
Chengdu
Print_ISBN :
978-0-7695-3600-2
DOI :
10.1109/IFITA.2009.568