Article citationsMore>>
Durumeric, Z., Kasten, J., Adrian, D., Halderman, J.A., Bailey, M., Li, F., Weaver, N., Amann, J., Beekman, J., Payer, M., et al. (2014) The Matter of Heartbleed. ACM Proceedings of the 2014 Conference on Internet Measurement, Vancouver, 5-7 November 2014, 475-488.
https://doi.org/10.1145/2663716.2663755
has been cited by the following article:
-
TITLE:
Reduce Malicious Activity in Trusted Programs
AUTHORS:
Elliot Ito, Depeng Li
KEYWORDS:
Malicious Activity
JOURNAL NAME:
Journal of Computer and Communications,
Vol.10 No.10,
October
20,
2022
ABSTRACT: The malicious activity comes in many forms, but many can come through trusted applications that we commonly use. Current systems have the capability to reduce damages, but implementations for the reduction are either outside of the system or are implemented in a manner that is unintuitive or confusing to users. In this paper, an access control method has been proposed that focuses on the alleviation of damage caused by such applications through the interactions between the user, application, and computer system. In details, the proposed model would work as a module or an interceptor to delegate permissions to applications through user input by using existing system calls. The evaluation about the proposed model as well as the first step implementation can show better security protection than existing systems.
Related Articles:
-
Casimir Komenan
-
Bérénice Dégboé, Christiane Koudoukpo, Mouhaéminath Alimi, Ghislain Emmanuel Sopoh, Fabrice Akpadjan, Roch Christian Johnson, Nadège Agbéssi, Hugues Adégbidi, Félix Atadokpèdé
-
Mohammad Reza Farahani, Wei Gao
-
Erdmann Görg
-
Fifonsi Ayélé Dangbo, Kossi Adjonou, Kouami Kokou, Juergen Blaser