Please use this identifier to cite or link to this item: https://doi.org/10.1109/SSIRI-C.2010.19
DC FieldValue
dc.titleThe problem of usable binary authentication
dc.contributor.authorWu, Y.
dc.contributor.authorYap, R.H.C.
dc.date.accessioned2013-07-23T09:26:52Z
dc.date.available2013-07-23T09:26:52Z
dc.date.issued2010
dc.identifier.citationWu, Y.,Yap, R.H.C. (2010). The problem of usable binary authentication. SSIRI-C 2010 - 4th IEEE International Conference on Secure Software Integration and Reliability Improvement Companion : 34-35. ScholarBank@NUS Repository. <a href="https://doi.org/10.1109/SSIRI-C.2010.19" target="_blank">https://doi.org/10.1109/SSIRI-C.2010.19</a>
dc.identifier.isbn9780769540870
dc.identifier.urihttp://scholarbank.nus.edu.sg/handle/10635/43169
dc.description.abstractAttacks by malware usually work by getting a binary to be executed. Sometimes users are unaware that such binaries are being executed. The end result is that attackers can either compromise a system or get it to fail. One defence against such attacks is to ensure integrity of files. A more comprehensive mechanism is binary authentication (code signing is also a form of binary authentication) which tries to ensure that any binaries loaded by the operating system and software applications are first authenticated, i.e. the content of the binary is known and is trusted. To have full protection using binary authentication, it makes sense to have a default deny policy where binaries which do not pass authentication are prevented from executing. However, if an operating system employs mandatory binary authentication for protection purposes, the end result may either be not user friendly or not very usable. In this paper, we discuss the issues and difficulties of making binary authentication usable on the Windows operating system. © 2010 IEEE.
dc.description.urihttp://libproxy1.nus.edu.sg/login?url=http://dx.doi.org/10.1109/SSIRI-C.2010.19
dc.sourceScopus
dc.typeConference Paper
dc.contributor.departmentTEMASEK LABORATORIES
dc.contributor.departmentCOMPUTER SCIENCE
dc.description.doi10.1109/SSIRI-C.2010.19
dc.description.sourcetitleSSIRI-C 2010 - 4th IEEE International Conference on Secure Software Integration and Reliability Improvement Companion
dc.description.page34-35
dc.identifier.isiutNOT_IN_WOS
Appears in Collections:Staff Publications

Show simple item record
Files in This Item:
There are no files associated with this item.

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.