MY150351A - A method for rootkit resistance based on a trusted chip - Google Patents

A method for rootkit resistance based on a trusted chip

Info

Publication number
MY150351A
MY150351A MYPI2010003209A MYPI2010003209A MY150351A MY 150351 A MY150351 A MY 150351A MY PI2010003209 A MYPI2010003209 A MY PI2010003209A MY PI2010003209 A MYPI2010003209 A MY PI2010003209A MY 150351 A MY150351 A MY 150351A
Authority
MY
Malaysia
Prior art keywords
rootkits
blocks
trusted chip
rootkit
protection against
Prior art date
Application number
MYPI2010003209A
Inventor
Abdulrahman Ahmad Abdu Muthana
Jamalul-Lail Abd Manan
Solahuddin Bin Shamsuddin
Mohd Faizal Bin Mubarak
Zaid Ahmad
Azimah Abdul Kadir
Original Assignee
Mimos Berhad
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Mimos Berhad filed Critical Mimos Berhad
Priority to MYPI2010003209A priority Critical patent/MY150351A/en
Priority to PCT/MY2010/000229 priority patent/WO2012005565A1/en
Publication of MY150351A publication Critical patent/MY150351A/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/80Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in storage media based on magnetic or optical technology, e.g. disks with sectors
    • G06F21/805Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in storage media based on magnetic or optical technology, e.g. disks with sectors using a security table for the storage sub-system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/80Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in storage media based on magnetic or optical technology, e.g. disks with sectors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2121Chip on media, e.g. a disk or tape with a chip embedded in its case

Abstract

THE METHOD AND SYSTEM ARE DISCLOSED FOR DISK PROTECTION AGAINST PERSISTENT ROOTKITS. THE METHOD INCLUDES DISK PROTECTION AGAINST PERSISTENT ROOTKITS (ROOTKITS THAT ATTEMPT TO MODIFY THE SYSTEM IMAGE) BASED ON TRUSTED CHIP (34). FURTHER, THE METHOD PROVIDES A REAL-TIME PROTECTION TO PREVENT ROOTKIT FROM BEING WRITTEN TO SYSTEM IMAGE. THE PRESENT METHOD IS FOR DISK PROTECTION AGAINST PERSISTENT ROOTKITS (ROOTKITS THAT ATTEMPT TO MODIFY THE SYSTEM IMAGE) BASED ON THE TRUSTED CHIP (34). THE METHOD LABELS ALL BLOCKS IN THE DISK WHERE THE SYSTEM FILES ARE LABELED AS SYSTEM AREA BLOCKS AND THE REMAINING BLOCKS AS USER AREA BLOCKS. THE LABELED BLOCKS ARE STORED IN A TABLE PROTECTED BY THE TRUSTED CHIP INTEGRATED ON THE HOST MACHINE. DURING THE NORMAL PROCESS, ALL WRITE OPERATIONS TO SYSTEM AREA ARE VERIFIED BEFORE WRITING IS MADE TO THE SYSTEM AREA BLOCKS. THE MOST ILLUSTRATIVE DRAWING:
MYPI2010003209A 2010-07-06 2010-07-06 A method for rootkit resistance based on a trusted chip MY150351A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
MYPI2010003209A MY150351A (en) 2010-07-06 2010-07-06 A method for rootkit resistance based on a trusted chip
PCT/MY2010/000229 WO2012005565A1 (en) 2010-07-06 2010-10-28 A method for rootkit resistance based on a trusted chip

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
MYPI2010003209A MY150351A (en) 2010-07-06 2010-07-06 A method for rootkit resistance based on a trusted chip

Publications (1)

Publication Number Publication Date
MY150351A true MY150351A (en) 2013-12-31

Family

ID=45441388

Family Applications (1)

Application Number Title Priority Date Filing Date
MYPI2010003209A MY150351A (en) 2010-07-06 2010-07-06 A method for rootkit resistance based on a trusted chip

Country Status (2)

Country Link
MY (1) MY150351A (en)
WO (1) WO2012005565A1 (en)

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2001231441B2 (en) * 2000-02-15 2004-02-05 Memjet Technology Limited Consumable authentication protocol and system
US6948165B1 (en) * 2001-02-28 2005-09-20 Western Digital Ventures, Inc. Method for installing an application program, to be executed during each bootload of a computer system for presenting a user with content options prior to conventional system startup presentation, without requiring a user's participation to install the program
KR100762973B1 (en) * 2007-02-07 2007-10-02 (주)노애드 Method and apparatus for detecting and deleting a virus code, and information storage medium storing a program thereof
US8250350B2 (en) * 2008-08-26 2012-08-21 Texas Digital And Multimedia Systems Computer system with non-volatile write-protected memory based operating system and secure system architecture

Also Published As

Publication number Publication date
WO2012005565A1 (en) 2012-01-12

Similar Documents

Publication Publication Date Title
ATE415658T1 (en) METHOD AND DEVICE FOR PROTECTING SYSTEM DATA ON A COMPUTER HARD DISK
MX2011013584A (en) Method and apparatus for modifying the presentation of content.
WO2010065271A3 (en) Systems and methods for providing continuous file protection at block level
GB201305422D0 (en) On demand virtual machine image streaming
TW200729882A (en) Method and apparatus for generating a license
TW200707255A (en) Data transcription in a data storage device
WO2007109685A3 (en) High efficiency portable archive
WO2006012197A3 (en) Method of improving computer security through sandboxing
MY170629A (en) Improvements in resisting the spread of unwanted code and data
TW200625101A (en) Backup/restore system and method thereof
WO2012006015A3 (en) Protecting video content using virtualization
WO2011040950A3 (en) Power interrupt management
WO2010004243A3 (en) Interrupt processing
WO2015014259A8 (en) Method and device for accelerating anti-virus scanning
RU2013154544A (en) DEVICE AND METHOD FOR HARDWARE-BASED DATA-PROCESSING BASED ON HARDWARE USING THE RULES OF THE Buffer MEMORY ADDRESS RULES
SG190955A1 (en) Transaction log recovery
WO2011005434A3 (en) Serial copy management system (scms)
WO2007022392A3 (en) Information protection method and system
TW200745853A (en) Method and system for automatically distributing real memory between virtual memory page sizes
WO2012012142A3 (en) Data access during data recovery
BRPI0406525A (en) content writing techniques
AU2011355202B2 (en) Device and method for protecting a security module from manipulation attempts in a field device
WO2011107040A3 (en) Data access processing method and device
ATE552563T1 (en) DRM SCHEMA EXTENSION
ATE410739T1 (en) SYSTEMS AND METHODS FOR IDENTIFYING A COMPLEX TEXT IN A PRESENTATION DATA STREAM