“…If we consider a computer host to include the host, the user channel, and the network channel, then host security can be divided into: (i) software security, which ensures the software running in the host, is authentic, e.g., antivirus [17], system call filtering [18], and binary authentication [19]; (ii) user security, which ensures the user, is authentic, e.g., password/biometric authentication, physical perimeters, and surveillance camera monitoring; and (iii) network security,which ensures the network communication, is authentic, e.g., personal firewalls [20]. Our approach to enhance host security is substantially different from the existing designs in three aspects.…”