File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: Dynamic integrity verification for software self-defense

TitleDynamic integrity verification for software self-defense
Authors
KeywordsIntegrity verification
Self-defense
Tamper proofing
Virus detection
Issue Date2005
PublisherCSREA Press.
Citation
Proceedings Of The 2005 International Conference On Security And Management, Sam'05, 2005, p. 327-333 How to Cite?
AbstractInstead of using traditional virus signature scanning, a strong dynamic integrity verification mechanism is designed to detect whether software is infected by virus. In our scheme that based on code encryption, hash value of an application is used as the encryption key for virus detection. Hash value comparison is not needed and the storage of decryption key is not required. If a virus infects the software, the application cannot be executed and there will be a notification message prompted to the user. Our mechanism can be applied to all PE format files like EXE.
Persistent Identifierhttp://hdl.handle.net/10722/93402
References

 

DC FieldValueLanguage
dc.contributor.authorWoo, Yen_HK
dc.contributor.authorHui, LCKen_HK
dc.contributor.authorChow, KPen_HK
dc.contributor.authorYiu, SMen_HK
dc.date.accessioned2010-09-25T15:00:00Z-
dc.date.available2010-09-25T15:00:00Z-
dc.date.issued2005en_HK
dc.identifier.citationProceedings Of The 2005 International Conference On Security And Management, Sam'05, 2005, p. 327-333en_HK
dc.identifier.urihttp://hdl.handle.net/10722/93402-
dc.description.abstractInstead of using traditional virus signature scanning, a strong dynamic integrity verification mechanism is designed to detect whether software is infected by virus. In our scheme that based on code encryption, hash value of an application is used as the encryption key for virus detection. Hash value comparison is not needed and the storage of decryption key is not required. If a virus infects the software, the application cannot be executed and there will be a notification message prompted to the user. Our mechanism can be applied to all PE format files like EXE.en_HK
dc.languageengen_HK
dc.publisherCSREA Press.en_HK
dc.relation.ispartofProceedings of The 2005 International Conference on Security and Management, SAM'05en_HK
dc.subjectIntegrity verificationen_HK
dc.subjectSelf-defenseen_HK
dc.subjectTamper proofingen_HK
dc.subjectVirus detectionen_HK
dc.titleDynamic integrity verification for software self-defenseen_HK
dc.typeConference_Paperen_HK
dc.identifier.emailHui, LCK:hui@cs.hku.hken_HK
dc.identifier.emailChow, KP:chow@cs.hku.hken_HK
dc.identifier.emailYiu, SM:smyiu@cs.hku.hken_HK
dc.identifier.authorityHui, LCK=rp00120en_HK
dc.identifier.authorityChow, KP=rp00111en_HK
dc.identifier.authorityYiu, SM=rp00207en_HK
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.scopuseid_2-s2.0-62349113987en_HK
dc.identifier.hkuros102645en_HK
dc.relation.referenceshttp://www.scopus.com/mlt/select.url?eid=2-s2.0-62349113987&selection=ref&src=s&origin=recordpageen_HK
dc.identifier.volume, v. 327-333en_HK
dc.identifier.spage327en_HK
dc.identifier.epage333en_HK
dc.identifier.scopusauthoridWoo, Y=36840069600en_HK
dc.identifier.scopusauthoridHui, LCK=8905728300en_HK
dc.identifier.scopusauthoridChow, KP=7202180751en_HK
dc.identifier.scopusauthoridYiu, SM=7003282240en_HK

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats