Detecting Code Alteration by Creating a Temporary Memory Bottleneck

IEEE Transactions on Information Forensics and Security(2009)

引用 49|浏览0
暂无评分
摘要
We develop a new technique whereby a poll worker can determine whether the software executing on electronic voting machines on election day has been altered from its factory version. Our generalized approach allows a human, using a known challenge-response pair, to detect attacks that involve modification or replacement of software on a computer based on the time it takes the computer to provide a correct response to a challenge. We exploit the large difference between main memory access times and cache memory access or CPU clock cycle times to significantly increase the time required to compute the right response when the software has been changed.
更多
查看译文
关键词
cache storage,computer viruses,government data processing,politics,program diagnostics,program verification,CPU clock cycle time,attack detection,cache memory access,challenge-response pair,code alteration detection,computer security,computer virus,electronic voting machine,factory version,main memory access time,poll worker,software execution,software modification,software protection,software replacement,software validation,software verification,temporary memory bottleneck,Computer security,computer viruses,software protection,software verification and validation
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要