Sciweavers

Share
DSOM
2003
Springer

Idiosyncratic Signatures for Authenticated Execution of Management Code

12 years 6 months ago
Idiosyncratic Signatures for Authenticated Execution of Management Code
TrustedFlow™ is a software solution to the problem of remotely authenticating code during execution. A continuous flow of idiosyncratic signatures assures that the software from which they have emanated is not changed prior to and during execution. TrustedFlow™ can be used to create a run-time trust relationship between the components of a distributed management system. Software, especially in the context of data networks, suffers from some inherent problems. These include modifications by an either malicious or inadvertent attacker, malware distribution (e.g., viruses and “Trojan horses”), and the use of malicious software remotely for penetration, intrusion, denial-of-service (DoS), and distributed DoS (DDoS). Management software is particularly critical from this point of view since it is used to monitor and, especially, to control network devices. Hence, malicious modification and use of management code can be particularly harmful to the network and advantageous for the att...
Mario Baldi, Yoram Ofek, Moti Yung
Added 06 Jul 2010
Updated 06 Jul 2010
Type Conference
Year 2003
Where DSOM
Authors Mario Baldi, Yoram Ofek, Moti Yung
Comments (0)
books