期刊文献+

A Method to Defend File-Attacking

A Method to Defend File-Attacking
下载PDF
导出
摘要 The paper points out that the deep reason why modern computer system fails to defense malware lies in that user has no right to control the access of information, and proposes an explicit authorization mechanism. Its basic idea is that user explicitly authorizes program the file set it can access, and monitor all file access operations; once program requests to access file out of the authorized file set, refuse it, and this means that the program is malicious or has design errors. Computers based on this novel mechanism can protect information from attacking reliably, and have good software and hardware compatibility. A testing system is presented to validate our theory. The paper points out that the deep reason why modern computer system fails to defense malware lies in that user has no right to control the access of information, and proposes an explicit authorization mechanism. Its basic idea is that user explicitly authorizes program the file set it can access, and monitor all file access operations; once program requests to access file out of the authorized file set, refuse it, and this means that the program is malicious or has design errors. Computers based on this novel mechanism can protect information from attacking reliably, and have good software and hardware compatibility. A testing system is presented to validate our theory.
机构地区 School of Computer
出处 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1419-1423,共5页 武汉大学学报(自然科学英文版)
基金 Supported by the Foundation of National Labora-tory for Modern Communications(51436050505KG0101)
关键词 information stealing information destroying MALWARE explicit authorization mechanism information stealing information destroying malware explicit authorization mechanism
  • 相关文献

参考文献10

  • 1Adleman L.M.An abstract theory of computer viruses[].Advances in cryptology - CRYPTO‘ Proceedings.1988
  • 2Bishop,M. An Overview of Computer Viruses in a Research Environment . 1992
  • 3KIROVSKI D,DRINIC M,POTKONJAK M.Enabling trusted soft-ware integrity[].Proceedings of theth International Confer-ence on Architectural Support for Programming Languages and Oper-ating Systems.2002
  • 4Chang F Z,Itzkovitz A,Karamcheti V.User-level re-source-constrained sandboxing[].USENIX Win-dows System Sypomsium.2000
  • 5Gregory R.Ganger,,David F.Nagle.Better Security via Smarter Devices[].IEEE workshop on hot topics in operating systems.2001
  • 6Virgil Gligor.20 Years of Operating System Security (Unix as one focus)[]..1999
  • 7Cohen F.Computer Viruses-Theory and Experi ments[].th DoD/ NBS Computer Security Conf.1984
  • 8Chess D M,White S R.An Undetectable Computer Virus[].Virus Bulletin Conference.2000
  • 9Cohen F.Computational Aspects of Computer Viruses[].Computers and Security.1989
  • 10Trilling S,Nachenberg C.The Future of Malware[].EICARBest Paper Proceedings.1999

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部