首页> 外文会议>International Workshop on Security Protocols >Requirements for Root of Trust Establishment (Transcript of Discussion)
【24h】

Requirements for Root of Trust Establishment (Transcript of Discussion)

机译:信托建立根源的要求(讨论的成绩单)

获取原文

摘要

Frank Stajano: You spoke about establishing a malware-free state. If I give you a bit string, which basically is a dump of all the memory that you're interested in, are you able to detect whether it contains malware? Any possible known or unknown malware? Do you assume you have that capability or not? Reply: Well, no, it's not easy to figure out whether the memory dump contains malware. Your question is also interesting because a binary program in the memory dump can have different behaviors on different systems; e.g., it can be a perfectly good program on one and malware on another.
机译:弗兰克斯塔贾诺:你谈到了建立一个恶意的州。如果我给你一个位字符串,基本上是您对您感兴趣的所有内存的转储,您是否能够检测它是否包含恶意软件?任何可能的已知或未知的恶意软件?你假设你有这种能力吗?回复:嗯,不,弄清楚内存转储是否包含恶意软件并不容易。您的问题也有趣,因为内存转储中的二进制程序可以在不同的系统上具有不同的行为;例如,它可以是另一个和恶意软件上一个完全好的程序。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号