首页 | 本学科首页   官方微博 | 高级检索  
     检索      

A Method to Defend File-Attacking
作者姓名:HE  Hongjun  LUO  Li  CAO  Sihua  FENG  Tao  PAN  Li  ZOU  Zhiji
作者单位:School of Computer, National University of Defense Technology, Changsha 410073, Hunan, China
基金项目:Supported by the Foundation of National Laboratory for Modern Communications (51436050505KG0101)
摘    要:0 IntroductionMalware of information attacking ai ms to steal and de-stroy program and data of user or system,includingTroy horse,virus , worm,spy-ware,and so on. They havecausedinvaluable loss all over the world. Till now,research-ers can not define malware accurately,and have no wayto de-fend unknown malware or malicious applicationsin real-ti me.Anti-virus software adopts special algorithm,andthe keyisidentification of virus . However ,itis a well-known difficul-ty to recognize unknown vir…

关 键 词:信息窃取  信息破坏  制品  安全认证  计算机
文章编号:1007-1202(2006)06-1419-05
收稿时间:2006-03-20

A method to defend file-attacking
HE Hongjun LUO Li CAO Sihua FENG Tao PAN Li ZOU Zhiji.A Method to Defend File-Attacking[J].Wuhan University Journal of Natural Sciences,2006,11(6):1419-1423.
Authors:He Hongjun  Luo Li  Cao Sihua  Feng Tao  Pan Li  Zou Zhiji
Institution:(1) School of Computer, National University of Defense Technology, 410073 Changsha, Hunan, China
Abstract:The paper points out that the deep reason why modern computer system fails to defense malware lies in that user has no right to control the access of information, and proposes an explicit authorization mechanism. Its basic idea is that user explicitly authorizes program the file set it can access, and monitor all file access operations; once program requests to access file out of the authorized file set, refuse it, and this means that the program is malicious or has design errors. Computers based on this novel mechanism can protect information from attacking reliably, and have good software and hardware compatibility. A testing system is presented to validate our theory.
Keywords:information stealing  information destroying  malware  explicit authorization mechanism
本文献已被 CNKI 维普 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号