A model of program execution for security purposes
نویسنده
چکیده
Assurance of software quality and security of computer systems have become dominant concerns in our networking age, to which models of program execution are important. A good model of program execution would allow program execution to be reliably and efficiently identified and verified online. On one hand, online program execution identification and verification help increase assurance of trustworthy software with respect to specific concerns in software quality and vulnerability. On the other hand, they are also helpful in detecting risks in untrustworthy software. We in this paper present a formal specification of program execution events for security purposes, and a model of program execution based upon the specification. This paper discusses the program execution model, specifically its background, the formal specification of program execution events with an underlying concept of program system call footprints, a formal description of the program execution model, two applications of the model in program execution identification and verification, and our experimental results of the model.
منابع مشابه
A System for Program Execution Identification on the Microsoft Windows Platforms
This paper describes a system for identification execution of programs using execution events of the programs. This system is based on a model of program execution for security purposes, and is implemented on the Microsoft Windows platforms using an operating system technique called DLL (Dynamic Linked Library) replacement. Compared to other related works, this paper has two key contributions: ...
متن کاملProvably secure and efficient identity-based key agreement protocol for independent PKGs using ECC
Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...
متن کاملResource leveling scheduling by an ant colony-based model
In project scheduling, many problems can arise when resource fluctuations are beyond acceptable limits. To overcome this, mathematical techniques have been developed for leveling resources. However, these produce a hard and inflexible approach in scheduling projects. The authors propose a simple resource leveling approach that can be used in scheduling projects with multi-mode execution activit...
متن کاملConsidering the Coefficient of Relationship between the Students’ Attitude toward Social Networks Policy making with Social Security Feeling
Abstract:This study aims at measuring the relationship between students‟ attitude toward govern-ment‟s virtual social network policy making with social security feeling, in another word, to which extent social security feeling emphasizing on social networks is determined via users‟ attitude toward government‟s media policy making? Analytical-descriptive method including survey is used in ...
متن کاملProcess algebraic modeling of authentication protocols for analysis of parallel multi-session executions
Many security protocols have the aim of authenticating one agent acting as initiator to another agent acting as responder and vice versa. Sometimes, the authentication fails because of executing several parallel sessions of a protocol, and because an agent may play both the initiator and responder role in parallel sessions. We take advantage of the notion of transition systems to specify authen...
متن کامل