首页> 外文会议>International Conference on Information and Communications Technology >Intrusion detection against unauthorized file modification by integrity checking and recovery with HW/SW platforms using programmable system-on-chip (SoC)
【24h】

Intrusion detection against unauthorized file modification by integrity checking and recovery with HW/SW platforms using programmable system-on-chip (SoC)

机译:通过使用可编程片上系统(SoC)的硬件/软件平台进行完整性检查和恢复,防止未经授权的文件修改的入侵检测

获取原文

摘要

The attacks of modifying files such as website hacking, virus infection and ransomware are becoming a recent issue. This is due to a lack of attention to the programs or maintenance of web applications after it has been completed and connected to the internet, while hackers will always try to find a security hole to infiltrate the system. The security of software-based system used in the market today is not good enough to protect those attacks because the software-based protection, in general, can still be modified or manipulated. Therefore, a mechanism that can protect files in a system (such as personal computer or server) by both software and hardware is required. Implementing the mechanism to a hardware can bring a better immunity from malware infections. This paper proposed a method that provides protection mechanism against unauthorized file modification using the existing Integrity Checking and Recovery (ICAR) concept by holistic approach (hardware and software protection) with an open source security-oriented platform using a programmable system on chip (SoC). The results of the simulations show that the system can protect the authenticity of files against file modification-based attacks in the limited scenarios of attack without modifying main system configuration.
机译:修改文件的攻击(例如网站黑客攻击,病毒感染和勒索软件)已成为近期的问题。这是由于在完成并连接到Internet之后对Web应用程序的程序或维护缺乏关注,而黑客将始终试图寻找一个安全漏洞来渗透该系统。当今市场上使用的基于软件的系统的安全性不足以保护这些攻击,因为通常仍可以修改或操纵基于软件的保护。因此,需要一种可以通过软件和硬件来保护系统(例如个人计算机或服务器)中的文件的机制。对硬件实施该机制可以更好地抵抗恶意软件感染。本文提出了一种方法,该方法使用整体方法(硬件和软件保护),使用现有的完整性检查和恢复(ICAR)概念,通过使用可编程片上系统(SoC)的面向开源安全性的平台,提供保护机制,防止未经授权的文件修改。仿真结果表明,该系统可以在有限的攻击场景下保护文件的真实性,使其免受基于文件修改的攻击,而无需修改主系统配置。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号