Software Run-Time Protection: A Cryptographic Issue

نویسنده

  • Josep Domingo-Ferrer
چکیده

A new method is featured which solves the sofhvare integrity problem by properly coding rather than enciphering. Adopting the lengthy and expensive solution which consists of having the whole program signedlencrypted by an authority would require fiil decryption and secure storage for the whole program before execution, whereas one signed instruction, pipe-lined decoding-executing, and secure recording of a few of the last read instructions sujj7ce in our case. A general use of the proposed system co& practically prevent any viral attack with minimum authority operation.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

PandA: Pairings and Arithmetic

This paper introduces PandA, a software framework for Pairings and Arithmetic. It is designed to bring together advances in the efficient computation of cryptographic pairings and the development and implementation of pairing-based protocols. The intention behind the PandA framework is to give protocol designers and implementors easy access to a toolbox of all functions needed for implementing ...

متن کامل

An Efficient Scheme to Provide Real-time Memory Integrity Protection

Memory integrity protection has been a longstanding issue in trusted system design. Most viruses and malware attack the system by modifying data that they are not authorized to access. With the development of the Internet, viruses and malware spread much faster than ever before. In this setting, protecting the memory becomes increasingly important. However, it is a hard problem to protect the d...

متن کامل

Applying Run-Time Monitoring to the Deep-Impact Fault Protection Engine

Run-time monitoring is a lightweight verification method whereby the correctness of a programs’ execution is verified at run-time using executable specifications. This paper describes the verification of the fault protection engine of the Deep-Impact spacecraft flight software using a temporal logic based run-time monitoring tool.

متن کامل

Crypto Manager: an object oriented software library for cryptographic mechanisms

An object oriented approach to implementing non-interactive cryptographic mechanisms is presented. The primary design goals are object reuse, minimal code redundancy, easy update and extension by new algorithms and an intuitive application programming interface. The object orientation proved to cause a run time overhead of no more than 4%.

متن کامل

One-Time Programs

In this work, we introduce one-time programs, a new computational paradigm geared towards security applications. A one-time program can be executed on a single input, whose value can be specified at run time. Other than the result of the computation on this input, nothing else about the program is leaked. Hence, a one-time program is like a black box function that may be evaluated once and then...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1990