{"title":"A Java Program Tamper-Proofing Method","authors":"Xuesong Zhang, Fengling He, Wanli Zuo","doi":"10.1109/SECTECH.2008.28","DOIUrl":"https://doi.org/10.1109/SECTECH.2008.28","url":null,"abstract":"Illegal distribution and use of software is a big ad hoc problem in software industry today, especially on the growing market of Java software product. Tamper-proofing techniques will disable some or all of the program¿s functionality once they detect any unwanted modifications during run time. This paper presents the attempt to Java software tamper-proofing technology by dynamic monitoring. The Java method¿s control flow graph is described by regular expressions, which can be regarded as a language. Certain stack signature in these control flows is also computed. During program execution, the protected method¿s control flow and stack signature information is verified at runtime by a monitor thread which checking whether the execution trace is accepted by the language, and the signature belongs to the right method. Experimental result shows that this tamper-proofing method is especially suitable for non-computation dense Java applications.","PeriodicalId":377461,"journal":{"name":"2008 International Conference on Security Technology","volume":"198 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123013249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"NeoMAN: A Negotiation Management System for IKE Protocol Based on X.509 Certificate in Cross Domain Application","authors":"Zhen Zhao, Taehyoun Kim, J.H. Kim, I. Kim, Y. Eom","doi":"10.1109/SECTECH.2008.13","DOIUrl":"https://doi.org/10.1109/SECTECH.2008.13","url":null,"abstract":"IPSec VPN is widely used to protect remote data access. IKE protocol is the mandatory key management protocol of IPSec protocol, it provides a manual configuration method for IPSec VPN. But manual configuration is complex, unreliable, unmanageable, and especially less of support for cross-domain management. This paper proposes an IKE negotiation management system based on X.509, called NeoMAN. The NeoMAN system is designed to analysis the security requirements in intra-/cross- domain, provides cross-domain security requirement negotiation, security policy generation, and automatic IKE client configuration. The proposed method reduces the complexity of the IKE configuration process, improves the adaptability of the IKE protocol in cross-domain application, and also provides the management approach for IPSec VPN application.","PeriodicalId":377461,"journal":{"name":"2008 International Conference on Security Technology","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116704949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Definition of Evaluation Assurance Levels and Estimation of Evaluation Efforts for Operational System Based ISO/IEC 19791","authors":"Kab-Seung Kou, Jae-goo Jeong, Gang-soo Lee","doi":"10.1109/SECTECH.2008.41","DOIUrl":"https://doi.org/10.1109/SECTECH.2008.41","url":null,"abstract":"ISO/IEC 19791 that is evaluation scheme of information security operational system, is not defined evaluation-assurance-level (i.e., EAL) like ISO/IEC 15408 (i.e., Common Criteria, CC) that is evaluation scheme of information security product. In this paper, ISO/IEC 19791 that is evaluation and certification on operational system defined EAL, from ELA 1 up to EAL 7. And ISO/IEC 19791 calculated relative rate of evaluation effort of each EAL.","PeriodicalId":377461,"journal":{"name":"2008 International Conference on Security Technology","volume":"447 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125777167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Off-line Cursive Handwritten Tamil Character Recognition","authors":"R. Kannan, R. Prabhakar, R. Suresh","doi":"10.1109/SECTECH.2008.33","DOIUrl":"https://doi.org/10.1109/SECTECH.2008.33","url":null,"abstract":"Concerning to optical character recognition, handwriting has sustained to persist as a means of communication and recording information in day to day life even with the introduction of new technologies. Hidden Markov Models (HMM) have long been a popular choice for Western cursive handwriting recognition following their success in speech recognition. However, when it comes to Indic script recognition, the published work employing HMMs is limited, and generally focused on isolated character recognition. A system for offline recognition of cursive handwritten Tamil characters is presented. In this effort, offline cursive handwritten recognition system for Tamil based on HMM and uses a combination of Time domain and frequency domain feature is proposed. The tolerance of the system is evident as it can overwhelm the complexities arise out of font variations and proves to be flexible and robust. Higher degree of accuracy in results has been obtained with the implementation of this approach on a comprehensive database. These initial results are promising and warrant further research in this direction. The results are also encouraging to explore possibilities for adopting the approach to other Indic scripts as well.","PeriodicalId":377461,"journal":{"name":"2008 International Conference on Security Technology","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128401962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}