MY150351A - A method for rootkit resistance based on a trusted chip - Google Patents
A method for rootkit resistance based on a trusted chipInfo
- Publication number
- MY150351A MY150351A MYPI2010003209A MYPI2010003209A MY150351A MY 150351 A MY150351 A MY 150351A MY PI2010003209 A MYPI2010003209 A MY PI2010003209A MY PI2010003209 A MYPI2010003209 A MY PI2010003209A MY 150351 A MY150351 A MY 150351A
- Authority
- MY
- Malaysia
- Prior art keywords
- rootkits
- blocks
- trusted chip
- rootkit
- protection against
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/80—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in storage media based on magnetic or optical technology, e.g. disks with sectors
- G06F21/805—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in storage media based on magnetic or optical technology, e.g. disks with sectors using a security table for the storage sub-system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/80—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in storage media based on magnetic or optical technology, e.g. disks with sectors
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2121—Chip on media, e.g. a disk or tape with a chip embedded in its case
Abstract
THE METHOD AND SYSTEM ARE DISCLOSED FOR DISK PROTECTION AGAINST PERSISTENT ROOTKITS. THE METHOD INCLUDES DISK PROTECTION AGAINST PERSISTENT ROOTKITS (ROOTKITS THAT ATTEMPT TO MODIFY THE SYSTEM IMAGE) BASED ON TRUSTED CHIP (34). FURTHER, THE METHOD PROVIDES A REAL-TIME PROTECTION TO PREVENT ROOTKIT FROM BEING WRITTEN TO SYSTEM IMAGE. THE PRESENT METHOD IS FOR DISK PROTECTION AGAINST PERSISTENT ROOTKITS (ROOTKITS THAT ATTEMPT TO MODIFY THE SYSTEM IMAGE) BASED ON THE TRUSTED CHIP (34). THE METHOD LABELS ALL BLOCKS IN THE DISK WHERE THE SYSTEM FILES ARE LABELED AS SYSTEM AREA BLOCKS AND THE REMAINING BLOCKS AS USER AREA BLOCKS. THE LABELED BLOCKS ARE STORED IN A TABLE PROTECTED BY THE TRUSTED CHIP INTEGRATED ON THE HOST MACHINE. DURING THE NORMAL PROCESS, ALL WRITE OPERATIONS TO SYSTEM AREA ARE VERIFIED BEFORE WRITING IS MADE TO THE SYSTEM AREA BLOCKS. THE MOST ILLUSTRATIVE DRAWING:
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
MYPI2010003209A MY150351A (en) | 2010-07-06 | 2010-07-06 | A method for rootkit resistance based on a trusted chip |
PCT/MY2010/000229 WO2012005565A1 (en) | 2010-07-06 | 2010-10-28 | A method for rootkit resistance based on a trusted chip |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
MYPI2010003209A MY150351A (en) | 2010-07-06 | 2010-07-06 | A method for rootkit resistance based on a trusted chip |
Publications (1)
Publication Number | Publication Date |
---|---|
MY150351A true MY150351A (en) | 2013-12-31 |
Family
ID=45441388
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
MYPI2010003209A MY150351A (en) | 2010-07-06 | 2010-07-06 | A method for rootkit resistance based on a trusted chip |
Country Status (2)
Country | Link |
---|---|
MY (1) | MY150351A (en) |
WO (1) | WO2012005565A1 (en) |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
AU2001231441B2 (en) * | 2000-02-15 | 2004-02-05 | Memjet Technology Limited | Consumable authentication protocol and system |
US6948165B1 (en) * | 2001-02-28 | 2005-09-20 | Western Digital Ventures, Inc. | Method for installing an application program, to be executed during each bootload of a computer system for presenting a user with content options prior to conventional system startup presentation, without requiring a user's participation to install the program |
KR100762973B1 (en) * | 2007-02-07 | 2007-10-02 | (주)노애드 | Method and apparatus for detecting and deleting a virus code, and information storage medium storing a program thereof |
US8250350B2 (en) * | 2008-08-26 | 2012-08-21 | Texas Digital And Multimedia Systems | Computer system with non-volatile write-protected memory based operating system and secure system architecture |
-
2010
- 2010-07-06 MY MYPI2010003209A patent/MY150351A/en unknown
- 2010-10-28 WO PCT/MY2010/000229 patent/WO2012005565A1/en active Application Filing
Also Published As
Publication number | Publication date |
---|---|
WO2012005565A1 (en) | 2012-01-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
ATE415658T1 (en) | METHOD AND DEVICE FOR PROTECTING SYSTEM DATA ON A COMPUTER HARD DISK | |
MX2011013584A (en) | Method and apparatus for modifying the presentation of content. | |
WO2010065271A3 (en) | Systems and methods for providing continuous file protection at block level | |
GB201305422D0 (en) | On demand virtual machine image streaming | |
TW200729882A (en) | Method and apparatus for generating a license | |
TW200707255A (en) | Data transcription in a data storage device | |
WO2007109685A3 (en) | High efficiency portable archive | |
WO2006012197A3 (en) | Method of improving computer security through sandboxing | |
MY170629A (en) | Improvements in resisting the spread of unwanted code and data | |
TW200625101A (en) | Backup/restore system and method thereof | |
WO2012006015A3 (en) | Protecting video content using virtualization | |
WO2011040950A3 (en) | Power interrupt management | |
WO2010004243A3 (en) | Interrupt processing | |
WO2015014259A8 (en) | Method and device for accelerating anti-virus scanning | |
RU2013154544A (en) | DEVICE AND METHOD FOR HARDWARE-BASED DATA-PROCESSING BASED ON HARDWARE USING THE RULES OF THE Buffer MEMORY ADDRESS RULES | |
SG190955A1 (en) | Transaction log recovery | |
WO2011005434A3 (en) | Serial copy management system (scms) | |
WO2007022392A3 (en) | Information protection method and system | |
TW200745853A (en) | Method and system for automatically distributing real memory between virtual memory page sizes | |
WO2012012142A3 (en) | Data access during data recovery | |
BRPI0406525A (en) | content writing techniques | |
AU2011355202B2 (en) | Device and method for protecting a security module from manipulation attempts in a field device | |
WO2011107040A3 (en) | Data access processing method and device | |
ATE552563T1 (en) | DRM SCHEMA EXTENSION | |
ATE410739T1 (en) | SYSTEMS AND METHODS FOR IDENTIFYING A COMPLEX TEXT IN A PRESENTATION DATA STREAM |