File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1007/978-3-642-15506-2_4
- Scopus: eid_2-s2.0-78651094438
- Find via
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Conference Paper: An analysis of the Green Dam Youth Escort software
Title | An analysis of the Green Dam Youth Escort software |
---|---|
Authors | |
Keywords | Analysis Forensic Perspective Green Dam Youth Escort |
Issue Date | 2010 |
Citation | Ifip Advances In Information And Communication Technology, 2010, v. 337 AICT, p. 49-62 How to Cite? |
Abstract | According to official Chinese media sources, the Green Dam Youth Escort (GDYE) software is intended to protect young citizens from viewing unhealthy information on the Internet. However, critics maintain that GDYE has serious security vulnerabilities that allow hackers to take control of computers installed with GDYE. Critics also claim that the software is designed to collect user data and keystrokes for transmission to remote servers for unknown purposes. GDYE was originally mandated to be pre-installed on every computer sold in the People's Republic of China. However, the plan was suddenly shelved in the face of intense international media attention. This paper evaluates the GDYE software's advertised functions and additional non-advertised capabilities. As the software may have spyware and malware functionality, the evaluation monitored the software behavior in a specialized controlled environment. The analysis was performed from a forensics perspective to collect digital evidence and traces in order to prove or disprove that GDYE captures and disseminates private information. © 2010 International Federation for Information Processing. |
Persistent Identifier | http://hdl.handle.net/10722/151985 |
ISSN | 2023 SCImago Journal Rankings: 0.242 |
References |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Li, F | en_US |
dc.contributor.author | Chan, H | en_US |
dc.contributor.author | Chow, KP | en_US |
dc.contributor.author | Lai, P | en_US |
dc.date.accessioned | 2012-06-26T06:32:04Z | - |
dc.date.available | 2012-06-26T06:32:04Z | - |
dc.date.issued | 2010 | en_US |
dc.identifier.citation | Ifip Advances In Information And Communication Technology, 2010, v. 337 AICT, p. 49-62 | en_US |
dc.identifier.issn | 1868-4238 | en_US |
dc.identifier.uri | http://hdl.handle.net/10722/151985 | - |
dc.description.abstract | According to official Chinese media sources, the Green Dam Youth Escort (GDYE) software is intended to protect young citizens from viewing unhealthy information on the Internet. However, critics maintain that GDYE has serious security vulnerabilities that allow hackers to take control of computers installed with GDYE. Critics also claim that the software is designed to collect user data and keystrokes for transmission to remote servers for unknown purposes. GDYE was originally mandated to be pre-installed on every computer sold in the People's Republic of China. However, the plan was suddenly shelved in the face of intense international media attention. This paper evaluates the GDYE software's advertised functions and additional non-advertised capabilities. As the software may have spyware and malware functionality, the evaluation monitored the software behavior in a specialized controlled environment. The analysis was performed from a forensics perspective to collect digital evidence and traces in order to prove or disprove that GDYE captures and disseminates private information. © 2010 International Federation for Information Processing. | en_US |
dc.language | eng | en_US |
dc.relation.ispartof | IFIP Advances in Information and Communication Technology | en_US |
dc.subject | Analysis | en_US |
dc.subject | Forensic Perspective | en_US |
dc.subject | Green Dam Youth Escort | en_US |
dc.title | An analysis of the Green Dam Youth Escort software | en_US |
dc.type | Conference_Paper | en_US |
dc.identifier.email | Chow, KP:chow@cs.hku.hk | en_US |
dc.identifier.authority | Chow, KP=rp00111 | en_US |
dc.description.nature | link_to_subscribed_fulltext | en_US |
dc.identifier.doi | 10.1007/978-3-642-15506-2_4 | en_US |
dc.identifier.scopus | eid_2-s2.0-78651094438 | en_US |
dc.relation.references | http://www.scopus.com/mlt/select.url?eid=2-s2.0-78651094438&selection=ref&src=s&origin=recordpage | en_US |
dc.identifier.volume | 337 AICT | en_US |
dc.identifier.spage | 49 | en_US |
dc.identifier.epage | 62 | en_US |
dc.identifier.scopusauthorid | Li, F=36844274600 | en_US |
dc.identifier.scopusauthorid | Chan, H=36842409000 | en_US |
dc.identifier.scopusauthorid | Chow, KP=7202180751 | en_US |
dc.identifier.scopusauthorid | Lai, P=19640260600 | en_US |
dc.identifier.issnl | 1868-4238 | - |