Abstract | ||
---|---|---|
Determining whether a user or system is exercising appropriate security practices is difficult in any context. Such difficulties are particularly pronounced when uncontrolled or unknown platforms join public networks. Commonly practiced techniques used to vet these hosts, such as system scans, have the potential to infringe on the privacy of users. In this article, we show that it is possible for clients to prove both the presence and proper functioning of security infrastructure without allowing unrestricted access to their system. We demonstrate this approach, specifically applied to antivirus security, by requiring clients seeking admission to a network to positively identify the presence or absence of malcode in a series of puzzles. The implementation of this mechanism and its application to real networks are also explored. In so doing, we demonstrate that it is not necessary for an administrator to be invasive to determine whether a client implements required security practices. |
Year | DOI | Venue |
---|---|---|
2008 | 10.1145/1341731.1341737 | ACM Trans. Inf. Syst. Secur. |
Keywords | DocType | Volume |
public network,assurance,security practice,real network,unknown platform,s.,weaver,Noninvasive Methods,network security,p. 2008. noninvasive methods for,m.,general terms: security additional key words and phrases: certification,security infrastructure,unrestricted access,antivirus security,b.,chien,malware acm reference format: traynor,proper functioning,and mcdaniel,hicks,p.,appropriate security practice,Host Certification | Journal | 11 |
Issue | ISSN | Citations |
3 | 1094-9224 | 4 |
PageRank | References | Authors |
0.48 | 25 | 5 |
Name | Order | Citations | PageRank |
---|---|---|---|
Patrick Traynor | 1 | 1171 | 87.80 |
Michael Chien | 2 | 4 | 0.48 |
Scott Weaver | 3 | 14 | 3.25 |
Boniface Hicks | 4 | 171 | 11.48 |
P. McDaniel | 5 | 7174 | 494.57 |