Journal of Computer and Communications

Volume 10, Issue 10 (October 2022)

ISSN Print: 2327-5219   ISSN Online: 2327-5227

Google-based Impact Factor: 1.12  Citations  

Reduce Malicious Activity in Trusted Programs

HTML  XML Download Download as PDF (Size: 406KB)  PP. 34-49  
DOI: 10.4236/jcc.2022.1010003    71 Downloads   474 Views  
Author(s)

ABSTRACT

The malicious activity comes in many forms, but many can come through trusted applications that we commonly use. Current systems have the capability to reduce damages, but implementations for the reduction are either outside of the system or are implemented in a manner that is unintuitive or confusing to users. In this paper, an access control method has been proposed that focuses on the alleviation of damage caused by such applications through the interactions between the user, application, and computer system. In details, the proposed model would work as a module or an interceptor to delegate permissions to applications through user input by using existing system calls. The evaluation about the proposed model as well as the first step implementation can show better security protection than existing systems.

Share and Cite:

Ito, E. and Li, D. (2022) Reduce Malicious Activity in Trusted Programs. Journal of Computer and Communications, 10, 34-49. doi: 10.4236/jcc.2022.1010003.

Cited by

No relevant information.

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.