Software Run-Time Protection: A Cryptographic Issue
نویسنده
چکیده
A new method is featured which solves the sofhvare integrity problem by properly coding rather than enciphering. Adopting the lengthy and expensive solution which consists of having the whole program signedlencrypted by an authority would require fiil decryption and secure storage for the whole program before execution, whereas one signed instruction, pipe-lined decoding-executing, and secure recording of a few of the last read instructions sujj7ce in our case. A general use of the proposed system co& practically prevent any viral attack with minimum authority operation.
منابع مشابه
PandA: Pairings and Arithmetic
This paper introduces PandA, a software framework for Pairings and Arithmetic. It is designed to bring together advances in the efficient computation of cryptographic pairings and the development and implementation of pairing-based protocols. The intention behind the PandA framework is to give protocol designers and implementors easy access to a toolbox of all functions needed for implementing ...
متن کاملAn Efficient Scheme to Provide Real-time Memory Integrity Protection
Memory integrity protection has been a longstanding issue in trusted system design. Most viruses and malware attack the system by modifying data that they are not authorized to access. With the development of the Internet, viruses and malware spread much faster than ever before. In this setting, protecting the memory becomes increasingly important. However, it is a hard problem to protect the d...
متن کاملApplying Run-Time Monitoring to the Deep-Impact Fault Protection Engine
Run-time monitoring is a lightweight verification method whereby the correctness of a programs’ execution is verified at run-time using executable specifications. This paper describes the verification of the fault protection engine of the Deep-Impact spacecraft flight software using a temporal logic based run-time monitoring tool.
متن کاملCrypto Manager: an object oriented software library for cryptographic mechanisms
An object oriented approach to implementing non-interactive cryptographic mechanisms is presented. The primary design goals are object reuse, minimal code redundancy, easy update and extension by new algorithms and an intuitive application programming interface. The object orientation proved to cause a run time overhead of no more than 4%.
متن کاملOne-Time Programs
In this work, we introduce one-time programs, a new computational paradigm geared towards security applications. A one-time program can be executed on a single input, whose value can be specified at run time. Other than the result of the computation on this input, nothing else about the program is leaked. Hence, a one-time program is like a black box function that may be evaluated once and then...
متن کامل