ETRI-Knowledge Sharing Plaform

KOREAN
논문 검색
Type SCI
Year ~ Keyword

Detail

Journal Article Software Authentication Method with Trusted Third Party
Cited - time in scopus Share share facebook twitter linkedin kakaostory
Authors
Yangseo Choi, Ikkyun Kim
Issue Date
2013-06
Citation
Research Notes in Information Science, v.14, pp.102-105
ISSN
2287-1934
Publisher
차세대융합기술연구원(AICIT)
Language
English
Type
Journal Article
Abstract
Malware has become a fundamental element of all the attacks. The first goal of every attack is to install a malware in a target system, because if a malware is installed in a system then attackers can do anything. In order to install a malware, attackers try various methods and techniques. Sometimes, they send a malware attached email or an email which contains the malicious links to a malware to the target users. These days, however, as the attacks are getting sophisticated more, the way of malware installation is very sophisticated as well. Recently, they tried to attack an update server for a famous application and changed an update module to malware. Shortly after, users automatically downloaded the malware which looked like a legitimate update module. During these attacks, attackers utilize normal legitimate applications. They modify the normal applications. They insert some malicious functionality into them. When these malwares are executed they operate just like normal applications. The malwares also have the same filenames and attributes. So, ordinary users can't identify whether an executable file is a malware or a legitimate application. In order to overcome this situation, we need a method which can authenticate the integrity of an application. We need to identify that an application is not modified from its original distribution. For that, we propose a software integrity authentication method. In this method, we check the integrity of an application with a trusted third party.
KSP Keywords
Authentication method, Executable file, Integrity Authentication, Methods and techniques, Software Integrity, Target Users, Trusted Third Party, fundamental element