2015 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS) 2015
DOI: 10.1109/iciiecs.2015.7193071
|View full text |Cite
|
Sign up to set email alerts
|

Behavior based authentication mechanism to prevent malicious code attacks in windows

Abstract: Most modern kernel of the operating system fails to ensure the authenticity of a suspicious process while servicing its system call. As a result, preventing kernel level malicious code attacks that target system table hooking becomes a challenging and serious security issue. The traditional process authentication techniques such as the process name, process identifier and execution path exercised by the kernel are not reliable. Therefore, in this paper, we proposed a kernel level authentication prototype to ve… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 7 publications
0
1
0
Order By: Relevance
“…The user behavior outcomes are processed and consolidated into a single value called the trust level. This trust level is sent to web services instead of passwords, the web service determines which trust threshold is needed to access their service or what features are available 18,19 .…”
Section: Behavior-based Authenticationmentioning
confidence: 99%
“…The user behavior outcomes are processed and consolidated into a single value called the trust level. This trust level is sent to web services instead of passwords, the web service determines which trust threshold is needed to access their service or what features are available 18,19 .…”
Section: Behavior-based Authenticationmentioning
confidence: 99%