• DocumentCode
    501422
  • Title

    An Approach for Sensitive Binary File Protection

  • Author

    JunKai, Gu ; Weiyong, Ji

  • Author_Institution
    Coll. of Geol. Eng. & Geomatics, Chang´´an Univ., Xi´´an, China
  • Volume
    1
  • fYear
    2009
  • fDate
    15-17 May 2009
  • Firstpage
    716
  • Lastpage
    718
  • Abstract
    When a host computer is attacked, files in the host computer are more or less unauthorizedly modified so as to achieve attacker\´s goal. Based on trusted computing technology, we present a trusted computer based approach for sensitive binary files protection. Different from traditional methods, our approach does not based on "condition-code", "intrusion-rule" and so on. It is checksum-based: each time before a sensitive binary filepsilas running, the kernel captures its running request first. And then the kernel calculates and compares its current hash, for example, SHA-1, against the expected one stored in the trusted platform module (TPM) in advance. If the comparison passes, the running request granted. Otherwise denied and the maliciously tampered file will be automatically recovered.
  • Keywords
    security of data; host computer; sensitive binary file protection; trusted computing technology; trusted platform module; Application software; Computer hacking; Data security; Educational institutions; Fingerprint recognition; Geology; Hardware; Information technology; Kernel; Protection; TPM5; file protection; trusted computing;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information Technology and Applications, 2009. IFITA '09. International Forum on
  • Conference_Location
    Chengdu
  • Print_ISBN
    978-0-7695-3600-2
  • Type

    conf

  • DOI
    10.1109/IFITA.2009.568
  • Filename
    5231752