TY - GEN
T1 - Component integrity check and recovery against malicious codes
AU - Park, Joon S.
AU - Jayaprakash, Gautam
AU - Giordano, Joseph
PY - 2006
Y1 - 2006
N2 - With the rise in usage of software components in distributed computing applications, the importance of safeguarding these components has assumed great significance. In trying to ensure the survivability of these components, we enable a mission-critical application to detect malicious codes in a component downloaded from a remote location and recover the original functionality of the compromised component. In our work, we use digital signatures to ensure the integrity of software components in a large distributed system. By detecting unauthorized add-ons to the original components we can ensure that only legitimate software components are allowed to execute in a protected software environment. We also explore techniques to recover the original functionality of the component under attack by removing the affected portion from the component. In this paper we introduce the system architecture and the support mechanisms for our proposed approaches.
AB - With the rise in usage of software components in distributed computing applications, the importance of safeguarding these components has assumed great significance. In trying to ensure the survivability of these components, we enable a mission-critical application to detect malicious codes in a component downloaded from a remote location and recover the original functionality of the compromised component. In our work, we use digital signatures to ensure the integrity of software components in a large distributed system. By detecting unauthorized add-ons to the original components we can ensure that only legitimate software components are allowed to execute in a protected software environment. We also explore techniques to recover the original functionality of the component under attack by removing the affected portion from the component. In this paper we introduce the system architecture and the support mechanisms for our proposed approaches.
UR - http://www.scopus.com/inward/record.url?scp=33751120992&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=33751120992&partnerID=8YFLogxK
U2 - 10.1109/AINA.2006.131
DO - 10.1109/AINA.2006.131
M3 - Conference contribution
AN - SCOPUS:33751120992
SN - 0769524664
SN - 9780769524665
T3 - Proceedings - International Conference on Advanced Information Networking and Applications, AINA
SP - 466
EP - 470
BT - Proceedings - 20th International Conference on Advanced Information Networking and Applications
T2 - 20th International Conference on Advanced Information Networking and Applications
Y2 - 18 April 2006 through 20 April 2006
ER -