首页> 外文会议>IEEE International Conference on Multimedia and Expo Workshops >Towards integrity protection of software for e-health data
【24h】

Towards integrity protection of software for e-health data

机译:致力于电子卫生数据软件的完整性保护

获取原文

摘要

The Integrity protection (IP) of software which deals with eHealth data, addresses the problem of static or dynamic code modification of the software. An attacker with the ability to modify the execution of software which deals with eHealth data can tamper with eHealth data. The target of IP is to protect the software assets; in this case it is to protect eHealth data. By modifying the binary source of an application, an attacker can produce a modified version of the application which can run in favor of the attacker objectives. Finally, if an attacker distributes the modified version of an application which deals with eHealth data, can harm eHealth environment (e.g., government agency) by disclosing the identity of the stake holders. The existing literatures (very few are disclosed and are available in academia) mainly focus on protection of tampering for static code of a software application. However, in practically, while an instance of software runs on unprotected memory environment, an attacker can launch dynamic modification of the running code and achieves the desired advantages. Therefore, the existing approaches do not tackle the tampering issues during the execution of a software application. The proposed research aims to explore this problem and proposes solutions based on a light-weight cryptographic methodology by generating secure cryptographic signature, which is a scrambled signature of a software application generated using cryptographic function and its security analysis has been investigated.
机译:涉及eHealth数据的软件的完整性保护(IP),解决了软件的静态或动态代码修改问题。一个攻击者能够修改执行ehealth数据的软件的执行,可以用电子保健数据篡改。知识产权的目标是保护软件资产;在这种情况下,它是保护eHealth数据。通过修改应用程序的二进制源,攻击者可以生成应用程序的修改版本,该应用程序可以支持攻击者目标。最后,如果攻击者分配涉及电子商务数据的申请的修改版本,可以通过披露股权持有人的身份来损害电子健康环境(例如,政府机构)。现有的文献(非常少数披露和学术界可用)主要集中在保护软件应用程序的静态代码的保护。但是,在实际上,虽然软件实例在未受保护的内存环境上运行,但攻击者可以启动运行代码的动态修改,并实现所需的优点。因此,现有方法在执行软件应用程序期间不会解决篡改问题。拟议的研究旨在探讨该问题,并通过生成安全加密签名来提出基于轻重加密方法的解决方案,这是使用加密功能生成的软件应用程序的乱乱签名,并研究了其安全分析。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号