基于API钩子的软件完整性验证模型研究

Changgeng Yu, Liping Lai
{"title":"基于API钩子的软件完整性验证模型研究","authors":"Changgeng Yu, Liping Lai","doi":"10.1109/ICSENG.2018.8638198","DOIUrl":null,"url":null,"abstract":"Software have been deployed in various measurement and control applications for information and network communication technology. A serious threat to system is malicious software attack that results in fake data delivery or private data disclosure. In order to increase security of the monitoring system, which software code will not be replaced and the tampered. The authors propose a software integrity measurement method based on trust transfer and Hook function. Verify pro- gram integrity during process creation, use program monitoring tools to monitor processes in the isolation environment, and update the white list in real time based on the monitoring results. Finally, experimental results demonstrating the effectiveness of prevent malicious code from destroying the integrity of the monitoring system by window platform experiment.","PeriodicalId":356324,"journal":{"name":"2018 26th International Conference on Systems Engineering (ICSEng)","volume":"194 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Research on Model for Verifying the Integrity of Software Based on API Hook\",\"authors\":\"Changgeng Yu, Liping Lai\",\"doi\":\"10.1109/ICSENG.2018.8638198\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Software have been deployed in various measurement and control applications for information and network communication technology. A serious threat to system is malicious software attack that results in fake data delivery or private data disclosure. In order to increase security of the monitoring system, which software code will not be replaced and the tampered. The authors propose a software integrity measurement method based on trust transfer and Hook function. Verify pro- gram integrity during process creation, use program monitoring tools to monitor processes in the isolation environment, and update the white list in real time based on the monitoring results. Finally, experimental results demonstrating the effectiveness of prevent malicious code from destroying the integrity of the monitoring system by window platform experiment.\",\"PeriodicalId\":356324,\"journal\":{\"name\":\"2018 26th International Conference on Systems Engineering (ICSEng)\",\"volume\":\"194 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 26th International Conference on Systems Engineering (ICSEng)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSENG.2018.8638198\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 26th International Conference on Systems Engineering (ICSEng)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSENG.2018.8638198","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

软件已部署在各种测量和控制应用的信息和网络通信技术。恶意软件攻击导致虚假数据传递或私人数据泄露是对系统的严重威胁。为了增加监控系统的安全性,其中的软件代码不会被替换和篡改。提出了一种基于信任传递和Hook函数的软件完整性度量方法。在进程创建期间验证程序完整性,使用程序监视工具监视隔离环境中的进程,并根据监视结果实时更新白名单。最后,通过窗口平台实验验证了防止恶意代码破坏监控系统完整性的有效性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Research on Model for Verifying the Integrity of Software Based on API Hook
Software have been deployed in various measurement and control applications for information and network communication technology. A serious threat to system is malicious software attack that results in fake data delivery or private data disclosure. In order to increase security of the monitoring system, which software code will not be replaced and the tampered. The authors propose a software integrity measurement method based on trust transfer and Hook function. Verify pro- gram integrity during process creation, use program monitoring tools to monitor processes in the isolation environment, and update the white list in real time based on the monitoring results. Finally, experimental results demonstrating the effectiveness of prevent malicious code from destroying the integrity of the monitoring system by window platform experiment.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信