A Hierarchical Protection Model for Protecting against Executable Content

نویسندگان

  • Takahiro Shinagawa
  • Kenji Kono
  • Takashi Masuda
چکیده

Executable content poses a threat of unauthorized access because it contains program code running on the user’s machine. Protecting against executable content is difficult because of the inevitable flaws in the implementation of protection mechanisms. This paper introduces a hierarchical protection model to tolerate flaws in protection mechanisms. This model improves both the granularity and the robustness of protection mechanisms by nesting two protection domains: a level-1 protection domain to provide fine-grained access control on executable content, and a level-2 protection domain to act as a fail-safe mechanism. We achieved an efficient implementation of the hierarchical protection model that incorporated the fine-grained protection domains proposed in our previous paper.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Program Counter Encoding for ARM® Architecture

ARM® is the prevalent processor architecture for embedded and mobile applications. For the smartphones, it is the processor for which software applications are running, whether the platform is with Apple’s iOS or Google’s Android. Software operations under these platforms are prone to semantic gap, which refers to potential difference between intended operations described in software and actual...

متن کامل

A Method for Protecting Access Pattern in Outsourced Data

Protecting the information access pattern, which means preventing the disclosure of data and structural details of databases, is very important in working with data, especially in the cases of outsourced databases and databases with Internet access. The protection of the information access pattern indicates that mere data confidentiality is not sufficient and the privacy of queries and accesses...

متن کامل

Protecting Software Code by Guards

Protection of software code against illegitimate modifications by its users is a pressing issue to many software developers. Many software-based mechanisms for protecting program code are too weak (e.g., they have single points of failure) or too expensive to apply (e.g., they incur heavy runtime performance penalty to the protected programs). In this paper, we present and explore a methodology...

متن کامل

Protection of Regions of Interest against Data Loss in a Generalized Multiple Description Framework

We present a simple and ef£cient scheme for protecting a region of interest (ROI) in an image sent across lossy communication networks. To increase the probability that the ROI is received with high quality, we extend the unequal loss protection framework of MD-SPIHT [1] by adding more redundancy to the ROI than to other parts of the image. The ROI is therefore heavily protected at the expense ...

متن کامل

Printer identification based on graylevel co-occurrence features for security and forensic applications

In today’s digital world securing different forms of content is very important in terms of protecting copyright and verifying authenticity. Many techniques have been developed to protect audio, video, digital documents, images, and programs (executable code). One example is watermarking of digital audio and images. We believe that a similar type of protection for printed documents is very impor...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003