Data protection in memory using byte reordering
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Jang, Hyun Jun | - |
dc.contributor.author | Hwang, Dae Won | - |
dc.contributor.author | Im, Eul Gyu | - |
dc.date.accessioned | 2022-12-21T02:15:32Z | - |
dc.date.available | 2022-12-21T02:15:32Z | - |
dc.date.created | 2022-09-16 | - |
dc.date.issued | 2008-06 | - |
dc.identifier.issn | 0302-9743 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/178284 | - |
dc.description.abstract | With the explosive uses of Internet, personal information can be exposed to attackers through various attacks. API hooking based mechanisms or virtual machine based mechanisms are proposed to protect personal data stored in the memory. But these mechanisms require another application program and attackers can get around by developing their own device drivers. We propose a new memory reorganizing mechanism to protect memory. In our proposed mechanism, a user can define his or her own data types and can store data using his or her own data types so that data formats stored in actual memory have different forms. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | Springer | - |
dc.title | Data protection in memory using byte reordering | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Im, Eul Gyu | - |
dc.identifier.doi | 10.1007/978-3-540-69304-8_7 | - |
dc.identifier.scopusid | 2-s2.0-45849098722 | - |
dc.identifier.bibliographicCitation | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), v.5075 LNCS, pp.62 - 68 | - |
dc.relation.isPartOf | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | - |
dc.citation.title | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | - |
dc.citation.volume | 5075 LNCS | - |
dc.citation.startPage | 62 | - |
dc.citation.endPage | 68 | - |
dc.type.rims | ART | - |
dc.type.docType | Conference Paper | - |
dc.description.journalClass | 1 | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scopus | - |
dc.subject.keywordPlus | Application programming interfaces (API) | - |
dc.subject.keywordPlus | Intersymbol interference | - |
dc.subject.keywordPlus | Application programs | - |
dc.subject.keywordPlus | Security of data | - |
dc.subject.keywordPlus | Application programs | - |
dc.subject.keywordPlus | Data formatting | - |
dc.subject.keywordPlus | Data protection | - |
dc.subject.keywordPlus | Data typing | - |
dc.subject.keywordPlus | device drivers | - |
dc.subject.keywordPlus | Heidelberg (CO) | - |
dc.subject.keywordPlus | international conferences | - |
dc.subject.keywordPlus | International workshops | - |
dc.subject.keywordPlus | personal information | - |
dc.subject.keywordPlus | Security informatics | - |
dc.subject.keywordPlus | Springer (CO) | - |
dc.subject.keywordPlus | Various attacks | - |
dc.subject.keywordPlus | Virtual machine (VM) | - |
dc.subject.keywordPlus | Mechanisms | - |
dc.subject.keywordPlus | Data privacy | - |
dc.subject.keywordPlus | Data protection | - |
dc.subject.keywordPlus | Data type | - |
dc.subject.keywordPlus | Device Driver | - |
dc.subject.keywordPlus | Exposed to | - |
dc.subject.keywordPlus | Memory protection | - |
dc.subject.keywordPlus | Personal information | - |
dc.subject.keywordPlus | Various attacks | - |
dc.subject.keywordPlus | Virtual machines | - |
dc.subject.keywordAuthor | Data Protection | - |
dc.subject.keywordAuthor | Information Security | - |
dc.subject.keywordAuthor | Memory protection | - |
dc.identifier.url | https://link.springer.com/chapter/10.1007/978-3-540-69304-8_7 | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
222, Wangsimni-ro, Seongdong-gu, Seoul, 04763, Korea+82-2-2220-1365
COPYRIGHT © 2021 HANYANG UNIVERSITY.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.