- Title
- In-kernel cryptographic executable verification
- Creator
- Motara, Yusuf, M, Irwin, Barry V W
- Subject
- To be catalogued
- Date
- 2005
- Type
- text
- Type
- article
- Identifier
- http://hdl.handle.net/10962/429937
- Identifier
- vital:72653
- Identifier
- https://doi.org/10.1007/0-387-31163-7_25
- Description
- This paper discusses the problems posed by Trojan horses and unau-thorized code, and reviews existing solutions for dealing with them. A technique involving the in-kernel verification of executables is pro-posed. Its advantages include simplicity, transparency, ease of use and minimal setup time. In addition, the technique has several applications, including assisting with honeypot implementations, incident response and forensic investigations.
- Format
- 10 pages, pdf
- Language
- English
- Relation
- Advances in Digital Forensics: IFIP International Conference on Digital Forensics, National Center for Forensic Science, Motara, Y. and Irwin, B., 2005. In-kernel cryptographic executable verification. In Advances in Digital Forensics: IFIP International Conference on Digital Forensics, National Center for Forensic Science, Orlando, Florida, February 13–16, 2005 1 (pp. 303-313). Springer US, Advances in Digital Forensics: IFIP International Conference on Digital Forensics, National Center for Forensic Science volume 2005 number 1 303 313 2005 978-0-387-31163-0
- Rights
- Publisher
- Rights
- Use of this resource is governed by the terms and conditions of the SpringerLink Terms of Use Statement ( https://link.springer.com/termsandconditions)
- Hits: 184
- Visitors: 191
- Downloads: 9
Thumbnail | File | Description | Size | Format | |||
---|---|---|---|---|---|---|---|
View Details Download | SOURCE1 | In-kernel cryptographic executable verification.pdf | 747 KB | Adobe Acrobat PDF | View Details Download |