Protecting Data from Malicious Software
نویسندگان
چکیده
Corruption or disclosure of sensitive user documents can be among the most lasting and costly effects of malicious software attacks. Many malicious programs specifically target files that are likely to contain important user data. Researchers have approached this problem by developing techniques for restricting access to resources on an application-by-application basis. These so-called “sandbox environments,” though effective, are cumbersome and difficult to use. In this paper, we present a prototype Windows NT/2000 tool that addresses malicious software threats to user data by extending the existing set of file-access permissions. Management and configuration options make the tool unobtrusive and easy to use. We have conducted preliminary experiments to assess the usability of the tool and to evaluate the effects of improvements we have made. Our work has produced an intuitive data-centric method of protecting valuable documents that provides an additional layer of defense beyond existing antivirus solutions.
منابع مشابه
Secure Communication Protocol for Protecting Computation Result of Free Roaming Mobile Agent
Mobile agent plays an important role in developing applications of open, distributed and mixed environments, such as the internet. Mobile agent or mobile software agent is piece of software that can operate autonomously to accomplish user assigned task. To explain more, mobile agent is the process which can migrate to hosts autonomously. As an agent travels to do execution in different environm...
متن کاملCode Obfuscation Techniques for Software Protection
An important security problem is to protect software against malicious host attacks. Since the malicious hosts are responsible for the program’s execution, there seems little the program can do to protect itself from disclosure, tampering and incorrect execution [7]. This paper will review some existing code obfuscation techniques for protecting software against those attacks. We will focus our...
متن کاملSDN malware: problems of current protection systems and potential countermeasures
Software-Defined Networking (SDN) is an emerging topic and securing its data and control plane is of great importance. The main goal of malicious SDN applications would be to compromise the SDN controller which is responsible for managing the SDN-based network. In this paper, we discuss two existent mechanisms aiming at protecting aforementioned planes: (i) sandboxing of SDN applications and (i...
متن کاملA Security Based Model for Mobile Agent Software Systems
Security modeling for agents has been one of the most challenging issues in developing practical mobile agent software systems. In the past, researchers have developed mobile agent systems with emphasis either on protecting mobile agents from malicious hosts or protecting hosts from malicious agents. In this paper, we propose a security based mobile agent system architecture that provides a gen...
متن کاملAn Enhancement of the Random Sequence 3-Level Obfuscated Algorithm for Protecting Agents Against Malicious Hosts
With the advent of agent technology, the need for security of applications becomes a concern that is beyond classical data security capability and considerations. Without proper security protection especially against a malicious host attack, the widespread use of agent technology can be severely impeded. The Random Sequence 3-level obfuscated algorithm has been proposed by the authors to improv...
متن کامل