首页> 外文会议>International Conference on Information and Communications Technology >Intrusion Detection Against Unauthorized File Modification by Integrity Checking and Recovery with HW/SW Platforms Using Programmable System-On-Chip (SoC)
【24h】

Intrusion Detection Against Unauthorized File Modification by Integrity Checking and Recovery with HW/SW Platforms Using Programmable System-On-Chip (SoC)

机译:使用可编程系统上使用可编程系统(SOC)通过完整性检查和恢复未经授权的文件修改的入侵检测

获取原文
获取外文期刊封面目录资料

摘要

The attacks of modifying files such as website hacking, virus infection and ransomware are becoming a recent issue. This is due to a lack of attention to the programs or maintenance of web applications after it has been completed and connected to the internet, while hackers will always try to find a security hole to infiltrate the system. The security of software-based system used in the market today is not good enough to protect those attacks because the software-based protection, in general, can still be modified or manipulated. Therefore, a mechanism that can protect files in a system (such as personal computer or server) by both software and hardware is required. Implementing the mechanism to a hardware can bring a better immunity from malware infections. This paper proposed a method that provides protection mechanism against unauthorized file modification using the existing Integrity Checking and Recovery (ICAR) concept by holistic approach (hardware and software protection) with an open source security-oriented platform using a programmable system on chip (SoC). The results of the simulations show that the system can protect the authenticity of files against file modification-based attacks in the limited scenarios of attack without modifying main system configuration.
机译:修改文件(如网站黑客,病毒感染和赎金软件)的攻击正在成为最近的问题。这是由于在完成并连接到互联网后缺乏对Web应用程序的程序或维护,而黑客将始终尝试找到一个安全漏洞以渗透系统。今天市场上使用的基于软件的系统安全性并不好,无法保护这些攻击,因为通常可以修改或操纵基于软件的保护。因此,需要一种可以通过软件和硬件保护系统(例如个人计算机或服务器)中的文件。将机制实施到硬件中可以从恶意软件感染中带来更好的免疫力。本文提出了一种方法,该方法提供了利用整体方法(硬件和软件保护)的现有完整性检查和恢复(ICAR)概念来提供防止未经授权的文件修改的方法,并使用芯片上的可编程系统(SOC)使用可编程安全的平台。模拟结果表明,系统可以保护文件的真实性免于在有限的攻击场景中对基于文件修改的攻击而无需修改主系统配置。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号