Please use this identifier to cite or link to this item: https://doi.org/10.4018/978-1-61520-682-7.ch004
DC FieldValue
dc.titleEstablishing software integrity trust: A survey and lightweight authentication system for windows
dc.contributor.authorWu, Y.
dc.contributor.authorSufatrio
dc.contributor.authorYap, R.H.C.
dc.contributor.authorRamnath, R.
dc.contributor.authorHalim, F.
dc.date.accessioned2014-07-04T03:16:29Z
dc.date.available2014-07-04T03:16:29Z
dc.date.issued2010
dc.identifier.citationWu, Y.,Sufatrio,Yap, R.H.C.,Ramnath, R.,Halim, F. (2010). Establishing software integrity trust: A survey and lightweight authentication system for windows. Trust Modeling and Management in Digital Environments: From Social Concept to System Development : 78-100. ScholarBank@NUS Repository. <a href="https://doi.org/10.4018/978-1-61520-682-7.ch004" target="_blank">https://doi.org/10.4018/978-1-61520-682-7.ch004</a>
dc.identifier.isbn9781615206827
dc.identifier.urihttp://scholarbank.nus.edu.sg/handle/10635/78456
dc.description.abstractMalware causes damage by stealing confidential data or making other software unusable. Ensuring software trustworthiness is difficult because malware may disguise itself to appear benign or trusted. This chapter explores the problem of making software more trustworthy through the use of binary integrity mechanisms. The authors review the problem of devising an effective binary integrity protection, and discuss how it complements other operating system security measures. They analyze design factors for binary integrity and compare existing systems. The authors then present a prototype which exemplifies a mandatory binary integrity mechanism and its integration within an operating system. Their system, BinAuth, demonstrates a practical, lightweight in-kernel binary authentication system for Microsoft Windows. A system like BinAuth shows that mandatory authentication is practical on complex commodity operating system like Windows. To deal with various constraints in the user's environments, BinAuth uses a flexible scheme which does not mandate public key infrastructure (PKI) although it can take advantage of it. The authors also combine the authentication with a simple software-ID scheme which is useful for software management and vulnerability assessment. © 2010, IGI Global.
dc.description.urihttp://libproxy1.nus.edu.sg/login?url=http://dx.doi.org/10.4018/978-1-61520-682-7.ch004
dc.sourceScopus
dc.typeOthers
dc.contributor.departmentCOMPUTER SCIENCE
dc.contributor.departmentTEMASEK LABORATORIES
dc.description.doi10.4018/978-1-61520-682-7.ch004
dc.description.sourcetitleTrust Modeling and Management in Digital Environments: From Social Concept to System Development
dc.description.page78-100
dc.identifier.isiutNOT_IN_WOS
Appears in Collections:Staff Publications

Show simple item record
Files in This Item:
There are no files associated with this item.

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.