A Hierarchical Protection Model for Protecting against Executable Content
نویسندگان
چکیده
Executable content poses a threat of unauthorized access because it contains program code running on the user’s machine. Protecting against executable content is difficult because of the inevitable flaws in the implementation of protection mechanisms. This paper introduces a hierarchical protection model to tolerate flaws in protection mechanisms. This model improves both the granularity and the robustness of protection mechanisms by nesting two protection domains: a level-1 protection domain to provide fine-grained access control on executable content, and a level-2 protection domain to act as a fail-safe mechanism. We achieved an efficient implementation of the hierarchical protection model that incorporated the fine-grained protection domains proposed in our previous paper.
منابع مشابه
Program Counter Encoding for ARM® Architecture
ARM® is the prevalent processor architecture for embedded and mobile applications. For the smartphones, it is the processor for which software applications are running, whether the platform is with Apple’s iOS or Google’s Android. Software operations under these platforms are prone to semantic gap, which refers to potential difference between intended operations described in software and actual...
متن کاملA Method for Protecting Access Pattern in Outsourced Data
Protecting the information access pattern, which means preventing the disclosure of data and structural details of databases, is very important in working with data, especially in the cases of outsourced databases and databases with Internet access. The protection of the information access pattern indicates that mere data confidentiality is not sufficient and the privacy of queries and accesses...
متن کاملProtecting Software Code by Guards
Protection of software code against illegitimate modifications by its users is a pressing issue to many software developers. Many software-based mechanisms for protecting program code are too weak (e.g., they have single points of failure) or too expensive to apply (e.g., they incur heavy runtime performance penalty to the protected programs). In this paper, we present and explore a methodology...
متن کاملProtection of Regions of Interest against Data Loss in a Generalized Multiple Description Framework
We present a simple and ef£cient scheme for protecting a region of interest (ROI) in an image sent across lossy communication networks. To increase the probability that the ROI is received with high quality, we extend the unequal loss protection framework of MD-SPIHT [1] by adding more redundancy to the ROI than to other parts of the image. The ROI is therefore heavily protected at the expense ...
متن کاملPrinter identification based on graylevel co-occurrence features for security and forensic applications
In today’s digital world securing different forms of content is very important in terms of protecting copyright and verifying authenticity. Many techniques have been developed to protect audio, video, digital documents, images, and programs (executable code). One example is watermarking of digital audio and images. We believe that a similar type of protection for printed documents is very impor...
متن کامل