An architecture for on-the-fly file integrity checking

3Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

There are several ways for an intruder to obtain access to a remote computing system, such as exploiting program vulnerabilities, stealing passwords, and so. The intruder can modify system utilities in order to hide his/her presence and to guarantee an open backdoor to the system. Many techniques have been proposed to detect unauthorized file modifications, but they usually work off-line and thus detect file modifications only when the system is already compromised. This paper presents an architecture to deal with this kind of problem. Through the combined use of digital signature techniques and system call interceptions, it allows for transparent on-the-fly integrity check of files in Unix systems. Its evaluation in real-world situations validates the approach, by showing overheads under 10% for most situations. © Springer-Verlag Berlin Heidelberg 2003.

Cite

CITATION STYLE

APA

Borchardt, M., Maziero, C., & Jamhour, E. (2003). An architecture for on-the-fly file integrity checking. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2847, 117–126. https://doi.org/10.1007/978-3-540-45214-0_11

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free