- Title
- In-kernel cryptographic executable verification
- Creator
- Motara, Yusuf, M, Irwin, Barry V W
- Date
- 2005
- Type
- text
- Type
- article
- Identifier
- http://hdl.handle.net/10962/429049
- Identifier
- vital:72556
- Identifier
- https://doi.org/10.1007/0-387-31163-7_25
- Description
- This paper discusses the problems posed by Trojan horses and unauthorized code, and reviews existing solutions for dealing with them. A technique involving the in-kernel verification of executables is proposed. Its advantages include simplicity, transparency, ease of use and minimal setup time. In addition, the technique has several applications, including assisting with honeypot implementations, incident response and forensic investigations.
- Format
- 10 pages, pdf
- Language
- English
- Relation
- Advances in Digital Forensics: IFIP International Conference on Digital Forensics, Motara, Y. and Irwin, B., 2005. In-kernel cryptographic executable verification. In Advances in Digital Forensics: IFIP International Conference on Digital Forensics, National Center for Forensic Science, Orlando, Florida, February 13–16, 2005 1 (pp. 303-313). Springer US, Advances in Digital Forensics: IFIP International Conference on Digital Forensics volume 2005 number 1 303 313 2005 1868-4238
- Rights
- Publisher
- Rights
- Use of this resource is governed by the terms and conditions of the SpringerLink Terms of Use Statement ( https://link.springer.com/termsandconditions)
- Hits: 26
- Visitors: 28
- Downloads: 4
Thumbnail | File | Description | Size | Format | |||
---|---|---|---|---|---|---|---|
View Details Download | SOURCE1 | In-kernel cryptographic executable verification.pdf | 614 KB | Adobe Acrobat PDF | View Details Download |