Component integrity check and recovery against malicious codes

Joon S. Park, Gautam Jayaprakash, Joseph Giordano

Research output: Chapter in Book/Entry/PoemConference contribution

3 Scopus citations

Abstract

With the rise in usage of software components in distributed computing applications, the importance of safeguarding these components has assumed great significance. In trying to ensure the survivability of these components, we enable a mission-critical application to detect malicious codes in a component downloaded from a remote location and recover the original functionality of the compromised component. In our work, we use digital signatures to ensure the integrity of software components in a large distributed system. By detecting unauthorized add-ons to the original components we can ensure that only legitimate software components are allowed to execute in a protected software environment. We also explore techniques to recover the original functionality of the component under attack by removing the affected portion from the component. In this paper we introduce the system architecture and the support mechanisms for our proposed approaches.

Original languageEnglish (US)
Title of host publicationProceedings - 20th International Conference on Advanced Information Networking and Applications
Pages466-470
Number of pages5
DOIs
StatePublished - 2006
Event20th International Conference on Advanced Information Networking and Applications - Vienna, Austria
Duration: Apr 18 2006Apr 20 2006

Publication series

NameProceedings - International Conference on Advanced Information Networking and Applications, AINA
Volume2
ISSN (Print)1550-445X

Other

Other20th International Conference on Advanced Information Networking and Applications
Country/TerritoryAustria
CityVienna
Period4/18/064/20/06

ASJC Scopus subject areas

  • General Engineering

Fingerprint

Dive into the research topics of 'Component integrity check and recovery against malicious codes'. Together they form a unique fingerprint.

Cite this