[go: up one dir, main page]

Main et al., 2003 - Google Patents

Software protection and application security: Understanding the battleground

Main et al., 2003

View PDF
Document ID
11899279891644218729
Author
Main A
van Oorschot P
Publication year
Publication venue
International Course on State of the Art and Evolution of Computer Security and Industrial Cryptography, Heverlee, Belgium

External Links

Snippet

We provide a state-of-the-art explication of application security and software protection. The relationship between application security and data security, network security, and software security is discussed. Three simplified threat models for software are sketched. To better …
Continue reading at courses.cs.washington.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security

Similar Documents

Publication Publication Date Title
Bhat et al. A survey on various threats and current state of security in android platform
Dunn et al. Cloaking malware with the trusted platform module
Ter Louw et al. Enhancing web browser security against malware extensions
Chen et al. Non-control-data attacks are realistic threats.
Holz et al. Detecting honeypots and other suspicious environments
Main et al. Software protection and application security: Understanding the battleground
US20090187963A1 (en) Method and apparatus for a cryptographically assisted computer system designed to deter viruses and malware via enforced accountability
Martin The ten-page introduction to Trusted Computing
KR20070111603A (en) Client and server security system
Suciu et al. Horizontal privilege escalation in trusted applications
US20090328003A1 (en) Systems And Methods For Regulating Execution Of Computer Software
Schiffman et al. Verifying system integrity by proxy
Yang et al. TMSUI: A trust management scheme of USB storage devices for industrial control systems
Kardile Crypto ransomware analysis and detection using process monitor
Liu et al. Binary exploitation in industrial control systems: Past, present and future
Ter Louw et al. Extensible web browser security
England Practical techniques for operating system attestation
Crăciun et al. Malware in the SGX supply chain: Be careful when signing enclaves!
WO2005045557A2 (en) The secure attention instruction central processing unit and system architecture
Shan et al. Tracer: enforcing mandatory access control in commodity OS with the support of light-weight intrusion detection and tracing
Belous et al. Computer viruses, malicious logic, and spyware
CN118051902A (en) Highway lane software safety protection method based on shelled anti-virus technology
Surve et al. SoK: Security Below the OS--A Security Analysis of UEFI
Roussel-Tarbouriech et al. Methodically defeating nintendo switch security
Xu et al. Satem: Trusted service code execution across transactions