Safe kernel extensions without run-time checking
OSDI '96 Proceedings of the second USENIX symposium on Operating systems design and implementation
Java security
Linux system security: the administrator's guide to open source security tools
Linux system security: the administrator's guide to open source security tools
Types of specifications of access policies
Secure Internet programming
ITS4: A static vulnerability scanner for C and C++ code
ACSAC '00 Proceedings of the 16th Annual Computer Security Applications Conference
Enforceable Security Policies
Using kernel hypervisors to secure applications
ACSAC '97 Proceedings of the 13th Annual Computer Security Applications Conference
MAPbox: Using Parameterized Behavior Classes to Confine Applications
MAPbox: Using Parameterized Behavior Classes to Confine Applications
Design of effective anti-malware system for mobile industrial devices based on windows CE
ICACT'09 Proceedings of the 11th international conference on Advanced Communication Technology - Volume 3
Hi-index | 0.00 |
Trojan-horses are hard to detect since they pretend normal programs [14]. This paper proposes 'SKETHIC (Secure Kernel Extension against Trojan Horses with Information-carrying Codes)', an anti-Trojan method based on resource access information attached to codes. This information serves as criteria for users' decision on installation of programs and forms access control policies for the runtime monitoring system. Compared to the previous approaches, SKETHIC introduces a way of reducing the users' decision-making overhead. To show clearly how it keeps a host secure from Trojans, we describe the mechanism in a formal way.