• DocumentCode
    479263
  • Title

    Program Security Inspection: Model and Implementation

  • Author

    Zemao Chen ; Xiaoping Wu ; Weimin Tang

  • Author_Institution
    Dept. of Inf. Security, Naval Univ. of Eng., Wuhan
  • fYear
    2008
  • fDate
    12-14 Oct. 2008
  • Firstpage
    1
  • Lastpage
    4
  • Abstract
    Current approaches for malicious code defense are mostly signature-scanning and execution-monitoring. Limited by the undecidability of malicious codes, they can´t defend against unknown attacks effectively. This paper investigates an integrity measurement and access control combined program security inspection model. On initial system setup, it indexes all known and trusted programs by both the identifiers and the integrity signatures of them in a white list (WL). During system running time, it measures integrity signature of each program file to be loaded and verifies it with WL. By disallowing unknown or unexpectedly modified programs from running, the model guarantees that only trusted programs can be invoked. Not relying on signatures of malicious codes, it is not limited by their undecidability and therefore is able to combat both known and unknown attacks with no false results. The model is implemented in Windows 2000/XP with neither source code nor binary level modifications to the Windows OS is required by using the technology of kernel mode file system filter driver. To improve the usability of the implementation, an administrative utility is created to censor new programs which came after the initial system setup. Those from trusted origins and not altered after release are thought to be secure and are added to WL for them to work normally.
  • Keywords
    authorisation; data integrity; digital signatures; program verification; system monitoring; access control rule; execution-monitoring approach; malicious code defense; malicious code undecidability; program integrity signature measurement; program security inspection model; signature-scanning approach; system running time; trusted program file verification; white list; Access control; Computer security; Context modeling; Data security; Databases; Filters; Information security; Inspection; Operating systems; Protection;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Wireless Communications, Networking and Mobile Computing, 2008. WiCOM '08. 4th International Conference on
  • Conference_Location
    Dalian
  • Print_ISBN
    978-1-4244-2107-7
  • Electronic_ISBN
    978-1-4244-2108-4
  • Type

    conf

  • DOI
    10.1109/WiCom.2008.2933
  • Filename
    4681122