Webpage Tamper-resistant Strategy Based on File System Filter Driver and Event-triggered
- DOI
- 10.2991/isccca.2013.143How to use a DOI?
- Keywords
- webpage tamper-resistant, file system filter driver, event-triggered
- Abstract
In order to develop a more practical, higher security and less time-consuming webpage tamper-resistant system, we proposed a webpage tamper-resistant strategy on the basis of original tamper-resistant strategies and technologies in the paper. This strategy adopted the file system filter driver and event-triggered technology. It also controlled users’ writing operations through the file filter driver of the bottom of the system, which can efficiently and actively prevent attackers’ illegal tampering. At the same time, it had also set up a monitoring module. The monitoring module and the tamper-resistant module formed a self-protection mechanism of the ring. Therefore, the strategy can greatly improve the security of system.
- Copyright
- © 2013, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Zhenqi Wang AU - Weiping Wang PY - 2013/02 DA - 2013/02 TI - Webpage Tamper-resistant Strategy Based on File System Filter Driver and Event-triggered BT - Proceedings of the 2nd International Symposium on Computer, Communication, Control and Automation (ISCCCA 2013) PB - Atlantis Press SP - 572 EP - 575 SN - 1951-6851 UR - https://doi.org/10.2991/isccca.2013.143 DO - 10.2991/isccca.2013.143 ID - Wang2013/02 ER -