Component Integrity Check and Recovery Against Malicious Codes

  • Authors:
  • Joon S. Park;Gautam Jayaprakash;Joseph Giordano

  • Affiliations:
  • Syracuse University, New York, USA;Syracuse University, New York, USA;Air Force Research Laboratory (AFRL), New York, USA

  • Venue:
  • AINA '06 Proceedings of the 20th International Conference on Advanced Information Networking and Applications - Volume 02
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

With the rise in usage of software components in distributed computing applications, the importance of safeguarding these components has assumed great significance. In trying to ensure the survivability of these components, we enable a mission-critical application to detect malicious codes in a component downloaded from a remote location and recover the original functionality of the compromised component. In our work, we use digital signatures to ensure the integrity of software components in a large distributed system. By detecting unauthorized add-ons to the original components we can ensure that only legitimate software components are allowed to execute in a protected software environment. We also explore techniques to recover the original functionality of the component under attack by removing the affected portion from the component. In this paper we introduce the system architecture and the support mechanisms for our proposed approaches.