Please use this identifier to cite or link to this item:
DC FieldValue
dc.titleHunting Trojan Horses
dc.contributor.authorMoffie, M.
dc.contributor.authorCheng, W.
dc.contributor.authorKaeli, D.
dc.contributor.authorZhao, Q.
dc.identifier.citationMoffie, M.,Cheng, W.,Kaeli, D.,Zhao, Q. (2006). Hunting Trojan Horses. ASID'06: 1st Workshop on Architectural and System Support for Improving Software Dependability : 12-17. ScholarBank@NUS Repository. <a href="" target="_blank"></a>
dc.description.abstractHTH (Hunting Trojan Horses) is a security framework developed for detecting difficult types of intrusions. HTH is intended as a complement to anti-virus software in that it targets unknown and zero-day Trojan Horses and Backdoors. In order to accurately identify these types of attacks HTH utilizes runtime information available during execution. The information collected includes fine-grained information flow, program execution flow and resources used.In this paper we present Harrier, an Application Security Monitor at the heart of our HTH framework. Harrier is an efficient run-time monitor that dynamically collects execution-related data. Harrier is capable of collecting information across different abstraction levels including architectural, system and library APIs. To date, Harrier is 3-4 times faster than comparable information flow tracking systems.Using the collected information, Harrier allows for accurate identification of abnormal program behavior. Preliminary results show a good detection rate with a low rate of false positives. Copyright 2006 ACM.
dc.subjectData labeling
dc.subjectInformation flow control
dc.subjectProgram monitoring
dc.subjectRun time environment
dc.typeConference Paper
dc.contributor.departmentSINGAPORE-MIT ALLIANCE
dc.description.sourcetitleASID'06: 1st Workshop on Architectural and System Support for Improving Software Dependability
Appears in Collections:Staff Publications

Show simple item record
Files in This Item:
There are no files associated with this item.


checked on Nov 26, 2021

Page view(s)

checked on Dec 2, 2021

Google ScholarTM



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.