File Download
There are no files associated with this item.
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Conference Paper: Dynamic integrity verification for software self-defense
Title | Dynamic integrity verification for software self-defense |
---|---|
Authors | |
Keywords | Integrity verification Self-defense Tamper proofing Virus detection |
Issue Date | 2005 |
Publisher | CSREA Press. |
Citation | Proceedings Of The 2005 International Conference On Security And Management, Sam'05, 2005, p. 327-333 How to Cite? |
Abstract | Instead of using traditional virus signature scanning, a strong dynamic integrity verification mechanism is designed to detect whether software is infected by virus. In our scheme that based on code encryption, hash value of an application is used as the encryption key for virus detection. Hash value comparison is not needed and the storage of decryption key is not required. If a virus infects the software, the application cannot be executed and there will be a notification message prompted to the user. Our mechanism can be applied to all PE format files like EXE. |
Persistent Identifier | http://hdl.handle.net/10722/93402 |
References |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Woo, Y | en_HK |
dc.contributor.author | Hui, LCK | en_HK |
dc.contributor.author | Chow, KP | en_HK |
dc.contributor.author | Yiu, SM | en_HK |
dc.date.accessioned | 2010-09-25T15:00:00Z | - |
dc.date.available | 2010-09-25T15:00:00Z | - |
dc.date.issued | 2005 | en_HK |
dc.identifier.citation | Proceedings Of The 2005 International Conference On Security And Management, Sam'05, 2005, p. 327-333 | en_HK |
dc.identifier.uri | http://hdl.handle.net/10722/93402 | - |
dc.description.abstract | Instead of using traditional virus signature scanning, a strong dynamic integrity verification mechanism is designed to detect whether software is infected by virus. In our scheme that based on code encryption, hash value of an application is used as the encryption key for virus detection. Hash value comparison is not needed and the storage of decryption key is not required. If a virus infects the software, the application cannot be executed and there will be a notification message prompted to the user. Our mechanism can be applied to all PE format files like EXE. | en_HK |
dc.language | eng | en_HK |
dc.publisher | CSREA Press. | en_HK |
dc.relation.ispartof | Proceedings of The 2005 International Conference on Security and Management, SAM'05 | en_HK |
dc.subject | Integrity verification | en_HK |
dc.subject | Self-defense | en_HK |
dc.subject | Tamper proofing | en_HK |
dc.subject | Virus detection | en_HK |
dc.title | Dynamic integrity verification for software self-defense | en_HK |
dc.type | Conference_Paper | en_HK |
dc.identifier.email | Hui, LCK:hui@cs.hku.hk | en_HK |
dc.identifier.email | Chow, KP:chow@cs.hku.hk | en_HK |
dc.identifier.email | Yiu, SM:smyiu@cs.hku.hk | en_HK |
dc.identifier.authority | Hui, LCK=rp00120 | en_HK |
dc.identifier.authority | Chow, KP=rp00111 | en_HK |
dc.identifier.authority | Yiu, SM=rp00207 | en_HK |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.scopus | eid_2-s2.0-62349113987 | en_HK |
dc.identifier.hkuros | 102645 | en_HK |
dc.relation.references | http://www.scopus.com/mlt/select.url?eid=2-s2.0-62349113987&selection=ref&src=s&origin=recordpage | en_HK |
dc.identifier.volume | , v. 327-333 | en_HK |
dc.identifier.spage | 327 | en_HK |
dc.identifier.epage | 333 | en_HK |
dc.identifier.scopusauthorid | Woo, Y=36840069600 | en_HK |
dc.identifier.scopusauthorid | Hui, LCK=8905728300 | en_HK |
dc.identifier.scopusauthorid | Chow, KP=7202180751 | en_HK |
dc.identifier.scopusauthorid | Yiu, SM=7003282240 | en_HK |