Main et al., 2003 - Google Patents
Software protection and application security: Understanding the battlegroundMain et al., 2003
View PDF- Document ID
- 11899279891644218729
- Author
- Main A
- van Oorschot P
- Publication year
- Publication venue
- International Course on State of the Art and Evolution of Computer Security and Industrial Cryptography, Heverlee, Belgium
External Links
Snippet
We provide a state-of-the-art explication of application security and software protection. The relationship between application security and data security, network security, and software security is discussed. Three simplified threat models for software are sketched. To better …
- 230000036961 partial 0 abstract description 3
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Bhat et al. | A survey on various threats and current state of security in android platform | |
Dunn et al. | Cloaking malware with the trusted platform module | |
Ter Louw et al. | Enhancing web browser security against malware extensions | |
Chen et al. | Non-control-data attacks are realistic threats. | |
Holz et al. | Detecting honeypots and other suspicious environments | |
Main et al. | Software protection and application security: Understanding the battleground | |
US20090187963A1 (en) | Method and apparatus for a cryptographically assisted computer system designed to deter viruses and malware via enforced accountability | |
Martin | The ten-page introduction to Trusted Computing | |
KR20070111603A (en) | Client and server security system | |
Suciu et al. | Horizontal privilege escalation in trusted applications | |
US20090328003A1 (en) | Systems And Methods For Regulating Execution Of Computer Software | |
Schiffman et al. | Verifying system integrity by proxy | |
Yang et al. | TMSUI: A trust management scheme of USB storage devices for industrial control systems | |
Kardile | Crypto ransomware analysis and detection using process monitor | |
Liu et al. | Binary exploitation in industrial control systems: Past, present and future | |
Ter Louw et al. | Extensible web browser security | |
England | Practical techniques for operating system attestation | |
Crăciun et al. | Malware in the SGX supply chain: Be careful when signing enclaves! | |
WO2005045557A2 (en) | The secure attention instruction central processing unit and system architecture | |
Shan et al. | Tracer: enforcing mandatory access control in commodity OS with the support of light-weight intrusion detection and tracing | |
Belous et al. | Computer viruses, malicious logic, and spyware | |
CN118051902A (en) | Highway lane software safety protection method based on shelled anti-virus technology | |
Surve et al. | SoK: Security Below the OS--A Security Analysis of UEFI | |
Roussel-Tarbouriech et al. | Methodically defeating nintendo switch security | |
Xu et al. | Satem: Trusted service code execution across transactions |