DocumentCode
501422
Title
An Approach for Sensitive Binary File Protection
Author
JunKai, Gu ; Weiyong, Ji
Author_Institution
Coll. of Geol. Eng. & Geomatics, Chang´´an Univ., Xi´´an, China
Volume
1
fYear
2009
fDate
15-17 May 2009
Firstpage
716
Lastpage
718
Abstract
When a host computer is attacked, files in the host computer are more or less unauthorizedly modified so as to achieve attacker\´s goal. Based on trusted computing technology, we present a trusted computer based approach for sensitive binary files protection. Different from traditional methods, our approach does not based on "condition-code", "intrusion-rule" and so on. It is checksum-based: each time before a sensitive binary filepsilas running, the kernel captures its running request first. And then the kernel calculates and compares its current hash, for example, SHA-1, against the expected one stored in the trusted platform module (TPM) in advance. If the comparison passes, the running request granted. Otherwise denied and the maliciously tampered file will be automatically recovered.
Keywords
security of data; host computer; sensitive binary file protection; trusted computing technology; trusted platform module; Application software; Computer hacking; Data security; Educational institutions; Fingerprint recognition; Geology; Hardware; Information technology; Kernel; Protection; TPM5; file protection; trusted computing;
fLanguage
English
Publisher
ieee
Conference_Titel
Information Technology and Applications, 2009. IFITA '09. International Forum on
Conference_Location
Chengdu
Print_ISBN
978-0-7695-3600-2
Type
conf
DOI
10.1109/IFITA.2009.568
Filename
5231752
Link To Document