Exetools  

Go Back   Exetools > General > General Discussion

Notices

Reply
 
Thread Tools Display Modes
  #1  
Old 06-24-2005, 21:57
redbull redbull is offline
Friend
 
Join Date: Mar 2004
Posts: 160
Rept. Given: 17
Rept. Rcvd 5 Times in 4 Posts
Thanks Given: 3
Thanks Rcvd at 6 Times in 6 Posts
redbull Reputation: 5
Implementation of a TrustedFlow System Prototype

Hi Guys,

I came across something interesting

http://netgroup.polito.it/netgroup/projects.html

(Yes the same person who orginally started the WinPCap packet capture drivers)

Here I found something very interesting:

Implementation of a TrustedFlow System Prototype

Software, especially in the context of data networks, suffers from some inherent problems. These include modifications, either by a malicious or inadvertent attacker, malware distribution (e.g., viruses and Trojan horses), and the use of malicious software remotely for penetration, intrusion, denial-of-service (DoS), and distributed DoS (DDoS). For example, a rogue user may change parameters of a given protocol (such as TCP) by manipulating the code and gain an unfair advantage in using network bandwidth. Assuring that a software module execution is correct in the sense that the user faithfully executes a given code with defined parameters and constraints is an open problem, which is especially important in the context of computing over communications networks.
TrustedFlow™ is a software solution to the problem of remotely authenticating code of software procedures and protocols during execution, which aims at assuring that the software is not changed prior to and during execution. The solution is achieved by continuously emanating a flow of idiosyncratic signatures. These signatures authenticate the software, from which they have emanated. The idiosyncratic signatures are generated by a secret function that is hidden (e.g., obfuscated) in the software and whose execution is subordinated to the proper execution of the software being authenticated. The flow of signatures is validated at a remote component. This generation and validation method of idiosyncratic signature is called TrustedFlow™ protocol. The TrustedFlow™ protocol is a general add-on protection tool that complements other security tools such as trusted computing platforms, authentication and encryption protocols.
Reply With Quote
Reply

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off


Similar Threads
Thread Thread Starter Forum Replies Last Post
Uac bypass implementation 0xall0c Source Code 8 03-20-2018 15:45
Armadilled Programs with Custom Implementation TmC General Discussion 3 05-15-2006 08:58


All times are GMT +8. The time now is 19:07.


Always Your Best Friend: Aaron, JMI, ahmadmansoor, ZeNiX, chessgod101
( 1998 - 2024 )