dc.contributor.author | Resh, Amit | |
dc.contributor.author | Kiperberg, Michael | |
dc.contributor.author | Leon, Roee | |
dc.contributor.author | Zaidenberg, Nezer J. | |
dc.date.accessioned | 2018-01-19T10:54:40Z | |
dc.date.available | 2018-01-19T10:54:40Z | |
dc.date.issued | 2017 | |
dc.identifier.citation | Resh, A., Kiperberg, M., Leon, R., & Zaidenberg, N. J. (2017). Preventing Execution of Unauthorized Native-Code Software. <i>International Journal of Digital Content Technology and its Applications</i>, <i>11</i>(3), 72-90. <a href="http://www.globalcis.org/jdcta/ppl/JDCTA3804PPL.pdf" target="_blank">http://www.globalcis.org/jdcta/ppl/JDCTA3804PPL.pdf</a> | |
dc.identifier.other | CONVID_26510832 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/56815 | |
dc.description.abstract | The business world is exhibiting a growing dependency on computer systems, their operations and
the databases they contain. Unfortunately, it also suffers from an ever growing recurrence of malicious
software attacks. Malicious attack vectors are diverse and the computer-security industry is producing
an abundance of behavioral-pattern detections to combat the phenomenon. This paper proposes an
alternative approach, based on the implementation of an attested, and thus trusted, thin-hypervisor.
Secondary level address translation tables, governed and fully controlled by the hypervisor, are
configured in order to assure that only pre-whitelisted instructions can be executed in the system. This
methodology provides resistance to most APT attack vectors, including those based on zero-day
vulnerabilities that may slip under behavioral-pattern radars. | |
dc.language.iso | eng | |
dc.publisher | Convergence Information Society (GlobalCIS) | |
dc.relation.ispartofseries | International Journal of Digital Content Technology and its Applications | |
dc.relation.uri | http://www.globalcis.org/jdcta/ppl/JDCTA3804PPL.pdf | |
dc.subject.other | hypervisor | |
dc.subject.other | trusted computing | |
dc.subject.other | whitelisting | |
dc.subject.other | attestation | |
dc.subject.other | APT-protection | |
dc.subject.other | cybersecurity | |
dc.title | Preventing Execution of Unauthorized Native-Code Software | |
dc.type | research article | |
dc.identifier.urn | URN:NBN:fi:jyu-201801181269 | |
dc.contributor.laitos | Informaatioteknologian tiedekunta | fi |
dc.contributor.laitos | Faculty of Information Technology | en |
dc.contributor.oppiaine | Tietotekniikka | fi |
dc.contributor.oppiaine | Mathematical Information Technology | en |
dc.type.uri | http://purl.org/eprint/type/JournalArticle | |
dc.date.updated | 2018-01-18T13:15:27Z | |
dc.type.coar | http://purl.org/coar/resource_type/c_2df8fbb1 | |
dc.description.reviewstatus | peerReviewed | |
dc.format.pagerange | 72-90 | |
dc.relation.issn | 1975-9339 | |
dc.relation.numberinseries | 3 | |
dc.relation.volume | 11 | |
dc.type.version | publishedVersion | |
dc.rights.copyright | © the Authors & Convergence Information Society, 2017. This is an open access article published by GlobalCIS. | |
dc.rights.accesslevel | openAccess | fi |
dc.type.publication | article | |
dc.type.okm | A1 | |