Please use this identifier to cite or link to this item:
https://doi.org/10.1109/SSIRI-C.2010.19
DC Field | Value | |
---|---|---|
dc.title | The problem of usable binary authentication | |
dc.contributor.author | Wu, Y. | |
dc.contributor.author | Yap, R.H.C. | |
dc.date.accessioned | 2013-07-23T09:26:52Z | |
dc.date.available | 2013-07-23T09:26:52Z | |
dc.date.issued | 2010 | |
dc.identifier.citation | Wu, Y.,Yap, R.H.C. (2010). The problem of usable binary authentication. SSIRI-C 2010 - 4th IEEE International Conference on Secure Software Integration and Reliability Improvement Companion : 34-35. ScholarBank@NUS Repository. <a href="https://doi.org/10.1109/SSIRI-C.2010.19" target="_blank">https://doi.org/10.1109/SSIRI-C.2010.19</a> | |
dc.identifier.isbn | 9780769540870 | |
dc.identifier.uri | http://scholarbank.nus.edu.sg/handle/10635/43169 | |
dc.description.abstract | Attacks by malware usually work by getting a binary to be executed. Sometimes users are unaware that such binaries are being executed. The end result is that attackers can either compromise a system or get it to fail. One defence against such attacks is to ensure integrity of files. A more comprehensive mechanism is binary authentication (code signing is also a form of binary authentication) which tries to ensure that any binaries loaded by the operating system and software applications are first authenticated, i.e. the content of the binary is known and is trusted. To have full protection using binary authentication, it makes sense to have a default deny policy where binaries which do not pass authentication are prevented from executing. However, if an operating system employs mandatory binary authentication for protection purposes, the end result may either be not user friendly or not very usable. In this paper, we discuss the issues and difficulties of making binary authentication usable on the Windows operating system. © 2010 IEEE. | |
dc.description.uri | http://libproxy1.nus.edu.sg/login?url=http://dx.doi.org/10.1109/SSIRI-C.2010.19 | |
dc.source | Scopus | |
dc.type | Conference Paper | |
dc.contributor.department | TEMASEK LABORATORIES | |
dc.contributor.department | COMPUTER SCIENCE | |
dc.description.doi | 10.1109/SSIRI-C.2010.19 | |
dc.description.sourcetitle | SSIRI-C 2010 - 4th IEEE International Conference on Secure Software Integration and Reliability Improvement Companion | |
dc.description.page | 34-35 | |
dc.identifier.isiut | NOT_IN_WOS | |
Appears in Collections: | Staff Publications |
Show simple item record
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.