A Method to Defend File-Attacking
The paper points out that the deep reason why modern computer system fails to defense malware lies in that user has no right to control the access of information, and proposes an explicit authorization mechanism. Its basic idea is that user explicitly authorizes program the file set it can access, a...
Saved in:
Published in | Wuhan University journal of natural sciences Vol. 11; no. 6; pp. 1419 - 1423 |
---|---|
Main Authors | , , , , , |
Format | Journal Article |
Language | English Chinese |
Published |
School of Computer, National University of Defense Technology, Changsha 410073, Hunan, China
01.11.2006
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | The paper points out that the deep reason why modern computer system fails to defense malware lies in that user has no right to control the access of information, and proposes an explicit authorization mechanism. Its basic idea is that user explicitly authorizes program the file set it can access, and monitor all file access operations; once program requests to access file out of the authorized file set, refuse it, and this means that the program is malicious or has design errors. Computers based on this novel mechanism can protect information from attacking reliably, and have good software and hardware compatibility. A testing system is presented to validate our theory. |
---|---|
Bibliography: | information stealing malware explicit authorization mechanism information destroying TP305 42-1405/N information stealing; information destroying; malware; explicit authorization mechanism SourceType-Scholarly Journals-2 ObjectType-Feature-2 ObjectType-Conference Paper-1 content type line 23 SourceType-Conference Papers & Proceedings-1 ObjectType-Article-3 |
ISSN: | 1007-1202 1993-4998 |
DOI: | 10.1007/BF02831788 |