期刊文献+

应用程序作弊型后门防御模型 被引量:4

Defense model against cheating backdoors in applications
下载PDF
导出
摘要 针对基于程序特征码检测清除后门代码的传统方法容易存在漏检的问题,在分析内嵌作弊型后门程序结构和后门激活机制的基础上,获得了利用合法消息建立后门控制信息传输隐通道的最小条件,提出一种基于打破后门激活条件预防作弊型后门的应用程序模型。通过对合法消息进行检查、缓冲和转换,拦截携带隐蔽信息的合法消息,打破隐藏于其中的后门控制信息编码,并通过事件日志审计检测漏过的非法操作和后门活动。在基于PC虚拟称重仪器上进行了实验,实验结果表明了该模型保护应用程序防御后门作弊的有效性。 Aiming at the problem that traditional approaches that detect and remove backdoor code by means of code pattern recognition tend to leave over undetected backdoors, on the basis of analysis of the structure of programs with embedded backdoor code and its ac- tivation mechanism, the minimum condition for establishing covert channel in existing legal message channel to transmit backdoor control information is acquired. An application model that prevents against undetected cheating backdoors by inhibiting their activation condition is proposed. Legal messages that are transmitted in legal channel are examined, buffered and transformed, so that those that carry covert information are intercepted and encoding of backdoor control message hidden in them is broken. Illegal operation and backdoor behavior that escape from interception of the pump are reexamined by audit of their event logs. Experimental results from a PC-based weighing instrument verified the validity of the model for protecting applications against cheating backdoors.
出处 《计算机工程与设计》 CSCD 北大核心 2010年第11期2423-2426,2438,共5页 Computer Engineering and Design
基金 广东省科技攻关重点基金项目(2007A060304003) 东莞市科技计划基金项目(2008108101020)
关键词 作弊后门 隐蔽通道 后门防御模型 信息安全 消息拦截 cheating backdoor covert channel backdoor defense model information security message interception
  • 相关文献

参考文献10

  • 1庄泗华,王剑,张福新.检测Linux下的VFS型内核后门软件[J].计算机应用研究,2005,22(5):194-196. 被引量:2
  • 2Kolter Jeremy Z,Maloof Marcus A.Leaming to detect and classify malicious executables in the wild [C].Seattle,WA,USA: 10th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining,2004:2721-2744.
  • 3Lyda, Robert. Using entropy analysis to find encrypted and packed Malware[J].IEEE Security and Privacy,2007,5(2):40-45.
  • 4Piergiorgio Di Giacomo.COTS and open source software components: are they really different on the battlefield?[C].Bilbao,Spain: 4th International Conference on COTS-Based Software Systems, 2005:301-310.
  • 5Document OIML D-SW Working Draft 1. General Requirements for Software Controlled Measuring Instruments [S].OIML TC5/SC2/N7,2006.
  • 6Jonathan Bannet,David W Price,Algis Rudys,et al. Hack-a-Vote: Security issues with electronic voting systems[J].IEEE Security and Privacy Magazine,2004,2(1):32-37.
  • 7王昌达,鞠时光,杨珍,郭殿春.隐通道存在的最小条件及其应用[J].计算机科学,2005,32(1):77-79. 被引量:5
  • 8姚立红,訾小超,李建华.隐蔽通道的信息传递模型[J].电子学报,2008,36(11):2216-2219. 被引量:4
  • 9戴梅,孙国强,刘志锋.基于操作语义的时间隐通道分析[J].计算机工程与设计,2009,30(7):1593-1595. 被引量:1
  • 10夏耐,林志强,茅兵,谢立.隐蔽通道发现技术综述[J].计算机科学,2006,33(12):1-5. 被引量:5

二级参考文献73

  • 1冯玉琳,李京,黄涛.对象语义理论和行为约束推理[J].计算机学报,1993,16(11):823-838. 被引量:12
  • 2王昌达,鞠时光,杨珍,郭殿春.隐通道存在的最小条件及其应用[J].计算机科学,2005,32(1):77-79. 被引量:5
  • 3陈渝,及兰盛,吴涛,邓朝晖.关于时间隐通道问题分析[J].计算机与现代化,1996(1):12-17. 被引量:1
  • 4Grusho A, Timonina E. Construction of the Covert Channels A]. Proceedings of the 2nd International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security[C]. LNCS 2776. Berlin: Springer-Verlag, 2003: 428 - 431.
  • 5NCSC-TG-03.A guide to understanding covert channel analysis of masted system[S].
  • 6DoD 5200.28-STD. Trusted Computer System Evaluation Criteria[S].
  • 7ISO/IEC 15408. The Common Criteria for information technology security evaluation[S].
  • 8Denning D E.A lattice model of secure information flow[J]. Communications of the ACM. 1976,19(5) : 236 - 243.
  • 9Hutter D, Volkamer M. Information Flow Control to Secure Dynamic Web Service Composition[ A]. Proceedings of the 3rd International Conference on Security in Pervasive Computing[C]. LNCS 3934. Berlin: Springer-Verlag, 2006:196 - 210.
  • 10Darvas A.A Theorem Proving Approach to Analysis of Secure Information Flow[ A]. Workshop on Issues in file Theory of Security[ C ]. LNCS 3450. Berlin: Springer-Verlag, 2003:193 - 209.

共引文献12

同被引文献13

引证文献4

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部