Tamper Detection Marking for Object Files
نویسندگان
چکیده
Much of present day computer software is highly mobile, with a great amount of software being delivered to a client host via a network shortly before execution begins. The integrity of mobile code is one important aspect for the secure execution of the code on the client host. We describe a cryptographic-steganographic approach to embedding authentication data within executable object files. Our approach simplifies management of and requires no additional bandwidth to accommodate the authentication data. Initial experimental results show no runtime performance degradation for the execution of the protected program.
منابع مشابه
Bandwidth Efficient Tamper Detection for Distributed Java Systems
The benefits of distributed computation present complex security considerations beyond those associated with the traditional computing paradigm. This paper describes a bandwidth efficient approach to authenticate distributed Java code. Our system utilizes steganographic techniques to embed a cryptographic checksum as a tamper detection mark into Java class files. The properties of this mark mak...
متن کاملUnified Camera Tamper Detection Based on Edge and Object Information
In this paper, a novel camera tamper detection algorithm is proposed to detect three types of tamper attacks: covered, moved and defocused. The edge disappearance rate is defined in order to measure the amount of edge pixels that disappear in the current frame from the background frame while excluding edges in the foreground. Tamper attacks are detected if the difference between the edge disapp...
متن کاملTamper-resistant storage techniques for multimedia systems
Tamper-resistant storage techniques provide varying degrees of authenticity and integrity for data. This paper surveys five implemented tamper-resistant storage systems that use encryption, cryptographic hashes, digital signatures and error-correction primitives to provide varying levels of data protection. Five key evaluation points for such systems are: (1) authenticity guarantees, (2) integr...
متن کاملVideo Stabilization using Hybrid of SIFT and SURF Algorithm
Video stabilization is an important enhancement techniques used to remove undesired motion in a video. The sphere of photo forensics is expanding hastily. Many passive photograph tamper detection techniques were presented techniques have been presented. Some of those techniques use characteristic extraction methods for tamper detection and localization. This work is based totally on extracting ...
متن کاملEnhancing Skid Resistance of Two-Component Road Marking Paint using Mineral and Recycled Materials
Low skid resistance of road marking paint is one of the major issues in the safety of vehicle drivers, cyclists, and pedestrians when traveling on the city streets. Among the variety of marking paint, two-component paint is widely used at intersections and roundabouts. Therefore, the paint used should have adequate skid resistance. The object of this study was to evaluat...
متن کامل