Baldi et al. - Google Patents
IDIOSYNCRATIC SIGNATURES FOR AUTHENTICATED EXECUTIONBaldi et al.
View PDF- Document ID
- 3769703610126097041
- Author
- Baldi M
- Ofek Y
- Yung M
External Links
Snippet
Assuring that a given code is faithfully executed with defined parameters and constraints is an open problem, which is especially important in the context of computing over communications networks. This work presents TrustedFlow™, a software solution to the …
- 230000005540 biological transmission 0 description 22
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/54—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/572—Secure firmware programming, e.g. of basic input output system [BIOS]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ahsan | Covert channel analysis and data hiding in TCP/IP | |
Shi et al. | Dynamic distributed honeypot based on blockchain | |
CN101072106B (en) | Method and system for defending against denial of service attacks | |
Petullo et al. | MinimaLT: minimal-latency networking through better security | |
Abdullaziz et al. | Lightweight authentication mechanism for software defined network using information hiding | |
Demir et al. | SeReCP: a secure and reliable communication platform for the smart grid | |
Joshi | Network security: know it all | |
CN108282337B (en) | A Routing Protocol Reinforcement Method Based on Trusted Cryptographic Cards | |
Baldi et al. | IDIOSYNCRATIC SIGNATURES FOR AUTHENTICATED EXECUTION | |
Song et al. | Secure remote control of field-programmable network devices | |
Banoth et al. | Modern cryptanalysis methods, advanced network attacks and cloud security | |
Baldi et al. | Idiosyncratic signatures for authenticated execution of management code | |
Chen et al. | Encryption algorithm for TCP session hijacking | |
Majhi et al. | Designing an adaptive firewall for enterprise cloud | |
Baldi et al. | The TrustedFlow/spl trade/protocol-idiosyncratic signatures for authenticated execution | |
Xiao et al. | Security in distributed and networking systems | |
Ahmad et al. | SECURITY ENHANCEMENT & SOLUTION FOR AUTHENTICATION IN CORPORATE NETWORK WITH FIREWALL CONFIGURATION AND AUTHENTICATION FOR SERVER PROTOCOL | |
Su et al. | DISCA: Decentralized Infrastructure for Secure Community Attribute Certifying | |
Haque | Web server vulnerability analysis in the context of transport layer security (tls) | |
Sadiku et al. | Network Security | |
Budzko et al. | Analysis of the level of security provided by advanced information and communication technologies | |
Allix | Covert channels analysis in TCP/IP networks | |
Demircioğlu | Analysis of port knocking mechanism | |
Kruegel et al. | Internet security | |
Ganguly | Network and application security: fundamentals and practices |