Preventing backdoors in server applications with a separated software architecture (short paper)

0Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We often rely on system components implemented by potentially untrusted parties. This implies the risk of backdoors, i.e., hidden mechanisms that elevate the privileges of an unauthenticated adversary or execute other malicious actions on certain triggers. Hardware backdoors have received some attention lately and we address in this paper the risk of software backdoors. We present a design approach for server applications that can - under certain assumptions - protect against software backdoors aiming at privilege escalation. We have implemented a proof-of-concept FTP server to demonstrate the practical feasibility of our approach. © 2013 Springer-Verlag.

Cite

CITATION STYLE

APA

Schuster, F., Rüster, S., & Holz, T. (2013). Preventing backdoors in server applications with a separated software architecture (short paper). In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7967 LNCS, pp. 197–206). https://doi.org/10.1007/978-3-642-39235-1_12

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free