Tamper Detection Marking for Object Files

نویسندگان

  • Mike Jochen
  • Lori L. Pollock
  • Lisa M. Marvel
چکیده

Much of present day computer software is highly mobile, with a great amount of software being delivered to a client host via a network shortly before execution begins. The integrity of mobile code is one important aspect for the secure execution of the code on the client host. We describe a cryptographic-steganographic approach to embedding authentication data within executable object files. Our approach simplifies management of and requires no additional bandwidth to accommodate the authentication data. Initial experimental results show no runtime performance degradation for the execution of the protected program.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Bandwidth Efficient Tamper Detection for Distributed Java Systems

The benefits of distributed computation present complex security considerations beyond those associated with the traditional computing paradigm. This paper describes a bandwidth efficient approach to authenticate distributed Java code. Our system utilizes steganographic techniques to embed a cryptographic checksum as a tamper detection mark into Java class files. The properties of this mark mak...

متن کامل

Unified Camera Tamper Detection Based on Edge and Object Information

In this paper, a novel camera tamper detection algorithm is proposed to detect three types of tamper attacks: covered, moved and defocused. The edge disappearance rate is defined in order to measure the amount of edge pixels that disappear in the current frame from the background frame while excluding edges in the foreground. Tamper attacks are detected if the difference between the edge disapp...

متن کامل

Tamper-resistant storage techniques for multimedia systems

Tamper-resistant storage techniques provide varying degrees of authenticity and integrity for data. This paper surveys five implemented tamper-resistant storage systems that use encryption, cryptographic hashes, digital signatures and error-correction primitives to provide varying levels of data protection. Five key evaluation points for such systems are: (1) authenticity guarantees, (2) integr...

متن کامل

Video Stabilization using Hybrid of SIFT and SURF Algorithm

Video stabilization is an important enhancement techniques used to remove undesired motion in a video. The sphere of photo forensics is expanding hastily. Many passive photograph tamper detection techniques were presented techniques have been presented. Some of those techniques use characteristic extraction methods for tamper detection and localization. This work is based totally on extracting ...

متن کامل

Enhancing Skid Resistance of Two-Component Road Marking Paint using Mineral and Recycled Materials

Low skid resistance of road marking paint is one of the major issues in the safety of vehicle drivers, cyclists, and pedestrians when traveling on the city streets. Among the variety of marking paint, two-component paint is widely used at intersections and roundabouts. Therefore, the paint used should have adequate skid resistance. The object of this study was to evaluat...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003