Show simple item record

dc.contributor.authorResh, Amit
dc.contributor.authorKiperberg, Michael
dc.contributor.authorLeon, Roee
dc.contributor.authorZaidenberg, Nezer J.
dc.date.accessioned2018-01-19T10:54:40Z
dc.date.available2018-01-19T10:54:40Z
dc.date.issued2017
dc.identifier.citationResh, A., Kiperberg, M., Leon, R., & Zaidenberg, N. J. (2017). Preventing Execution of Unauthorized Native-Code Software. <i>International Journal of Digital Content Technology and its Applications</i>, <i>11</i>(3), 72-90. <a href="http://www.globalcis.org/jdcta/ppl/JDCTA3804PPL.pdf" target="_blank">http://www.globalcis.org/jdcta/ppl/JDCTA3804PPL.pdf</a>
dc.identifier.otherCONVID_26510832
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/56815
dc.description.abstractThe business world is exhibiting a growing dependency on computer systems, their operations and the databases they contain. Unfortunately, it also suffers from an ever growing recurrence of malicious software attacks. Malicious attack vectors are diverse and the computer-security industry is producing an abundance of behavioral-pattern detections to combat the phenomenon. This paper proposes an alternative approach, based on the implementation of an attested, and thus trusted, thin-hypervisor. Secondary level address translation tables, governed and fully controlled by the hypervisor, are configured in order to assure that only pre-whitelisted instructions can be executed in the system. This methodology provides resistance to most APT attack vectors, including those based on zero-day vulnerabilities that may slip under behavioral-pattern radars.
dc.language.isoeng
dc.publisherConvergence Information Society (GlobalCIS)
dc.relation.ispartofseriesInternational Journal of Digital Content Technology and its Applications
dc.relation.urihttp://www.globalcis.org/jdcta/ppl/JDCTA3804PPL.pdf
dc.subject.otherhypervisor
dc.subject.othertrusted computing
dc.subject.otherwhitelisting
dc.subject.otherattestation
dc.subject.otherAPT-protection
dc.subject.othercybersecurity
dc.titlePreventing Execution of Unauthorized Native-Code Software
dc.typeresearch article
dc.identifier.urnURN:NBN:fi:jyu-201801181269
dc.contributor.laitosInformaatioteknologian tiedekuntafi
dc.contributor.laitosFaculty of Information Technologyen
dc.contributor.oppiaineTietotekniikkafi
dc.contributor.oppiaineMathematical Information Technologyen
dc.type.urihttp://purl.org/eprint/type/JournalArticle
dc.date.updated2018-01-18T13:15:27Z
dc.type.coarhttp://purl.org/coar/resource_type/c_2df8fbb1
dc.description.reviewstatuspeerReviewed
dc.format.pagerange72-90
dc.relation.issn1975-9339
dc.relation.numberinseries3
dc.relation.volume11
dc.type.versionpublishedVersion
dc.rights.copyright© the Authors & Convergence Information Society, 2017. This is an open access article published by GlobalCIS.
dc.rights.accesslevelopenAccessfi
dc.type.publicationarticle
dc.type.okmA1


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record