期刊文献+

一种信息泄漏的新方式及其应对策略 被引量:4

A New Way of Internal Memory Information Leakage and its Solutions
下载PDF
导出
摘要 文章基于验证和解决信息设备内存储器存在的信息安全泄漏隐患,提出了内存储器信息泄漏概念并对内存储器存在信息泄漏的原因做了介绍。实测发现现有内存储器存在信息泄漏状况,基于此,该文提出了基于公共信息网和文件型恶意代码窃取的内存储器信息泄漏方式并完成了实测过程,文章结论对于信息安全保密领域的内存储器信息泄漏隐患防护具有重要意义,尤其适用于安全隔离和信息交换等信息系统领域,具有较广泛的应用前景和重大的社会意义。 The concept of internal memory information leakage is proposed,and these reasons for internal memory information leakage are explained for the goal based on the test and solving the problem of computer internal memory information leakage.Some existing internal Memory devices are tested,and the results shows that a few internal Memory devices have information leakage danger,and a new approach to internal memory information leakage based on public information networks and malicious code type of file stolen is proposed and tested in a practical way.The conclusion for internal memory information leakage prevention in the information security domain is important,especially for security segregation and information-exchanging product and others information systems,and has a good prospect and great social value and economic value.
作者 石军
出处 《信息网络安全》 2011年第10期38-40,共3页 Netinfo Security
基金 国家科技支撑计划重点项目(2009BAH52B06) 中科院知识创新重点方向项目(YYYJ-1013)
关键词 网络安全隔离设备 内存信息泄漏 应对策略 network security segregation and information-exchanging device internal memory information leakage solution strategy
  • 相关文献

参考文献3

  • 1Lest We Remember:Cold Boot Attacks on Encryption Keys[OL].http://citp.princeton.edu/memory/,2011-09-15.
  • 2吴淼,胡明,王兴,阎实.铁电随机存储器的研究进展[J].压电与声光,2003,25(6):472-475. 被引量:9
  • 3石军.一种被动式监测信息攻击的新实现方式[C].全国计算机安全学术交流会论文集,2008:113-117.

二级参考文献1

共引文献8

同被引文献30

  • 1马华.“艳照门”后,如何保护你的隐私文件[J].信息网络安全,2008(4):75-76. 被引量:2
  • 2黄昆,张大方,谢高岗,金军航.一种面向深度数据包检测的紧凑型正则表达式匹配算法[J].中国科学:信息科学,2010,40(2):356-370. 被引量:12
  • 3王冉晴,刘辉.安全隔离与信息交换系统在分级保护中的应用[J].保密技术信息,2008,(06):62.
  • 4Linode hacked, CCs and passwords leaked[EB/OLJ.http://slashdot.org/ firehose.pl?op =view&type=submission&id=2603667.
  • 5Best Practices for Designing and Managing Your Data Protection / Data Loss Prevention Pro-gram[EB/OL].http://www.mcafee.com/us/ resources/reports/rp-ponemon-data-protection-full.pdf.
  • 6Tore Torsteinbo. Data Loss Prevention Systems and Their Weaknesses [D].Kristiamand and Grimstad, Norway: University of Agder.2012,.
  • 7Xiaosong Zhang, Research and Application of the Transparent Data Encpryption In Intranet Data Leakage Prevention [J].Computational Intelligence and Security, 2009. CIS '09. International Confer-ence on (Volume:2).376-379.
  • 8P. John, A. Moshchuk, S. D. Gribble, and A. Krishnamurthy. Studying spamming botnets using botlab [J], In USENIX Symposium on Networked Systems Design and Implementation (NSDI), 2009. 291-306.
  • 9R. Perdisci,W.Lee,N.Feamster. Behavioral clus-tering of HTTP-based malware and signature gen-eration using malicious network traces [JJ.In USENIX conference on Networked systems design and implementation (NSDI),2/)10, 26-26.
  • 10Brian Schulte , NetGator: malware detection using program interactive challenges [J],DIMVA'12 Proceedings of the 9th international conference on Detection of Intrusions and Malware, and Vulner-ability Assessment,2013, 164-183.

引证文献4

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部