File Integrity Checkers: State of the Art and Best Practices

نویسندگان

  • Yusuf M Motara
  • Barry Irwin
چکیده

Assuring that system files have not been tampered with over time is a vital, but oftoverlooked, aspect of system security. File integrity checkers provide ways to assure the validity of files on a system. This paper concerns itself with a review of file integrity checkers. It pays particular attention to what the minimum requirements for an integrity checker are, the different approaches taken to integrity checking, the strengths and weaknesses of each approach, major divisions in checker design, innovative or unusual features of certain checkers, and appropriate situations under which each type of checker should be used. The design of an integrity checker which combines the best features of various checkers is described and discussed.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Understanding the Fault Resilience of File System Checkers

File system checkers serve as the last line of defense to recover a corrupted file system back to a consistent state. Therefore, their reliability is critically important. Motivated by real accidents, in this paper we study the behavior of file system checkers under faults. We systematically inject emulated faults to interrupt the checkers and examine the impact on the file system images. In do...

متن کامل

Towards Robust File System Checkers

File systems may become corrupted for many reasons despite various protection techniques. Therefore, most file systems come with a checker to recover the file system to a consistent state. However, existing checkers are commonly assumed to be able to complete the repair without interruption, which may not be true in practice. In this work, we demonstrate via fault injection experiments that che...

متن کامل

Hardware-Assisted Intrusion Detection by Preserving Reference Information Integrity

Malware detectors and integrity checkers detect malicious activities by comparing against reference data. To ensure their trustworthy operation, it is crucial to protect the reference data from unauthorized modification. This paper proposes the Soteria Security Card (SSC), an append-only storage. To the best of our knowledge, this work is the first to introduce the concept of an append-only sto...

متن کامل

Identification and Prioritization of the State-of-the-Art Technologies in the Management of Iranian Public Libraries

Purpose: State-of-the-art technology refers to the best and latest technological advancement possible at a particular time. Today, public libraries play a key role in the various cultural and social spheres of society. Although various technologies can help to fulfill the basic roles of public libraries correctly and completely, their application in the context of these libraries undoubtedly fa...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005