Download Advances in Information and Computer Security: 9th by Maki Yoshida, Koichi Mouri PDF

By Maki Yoshida, Koichi Mouri

This booklet constitutes the refereed lawsuits of the ninth overseas Workshop on protection, IWSEC 2014, held in Hirosaki, Japan, in August 2014. The thirteen normal papers offered including eight brief papers during this quantity have been conscientiously reviewed and chosen from fifty five submissions. the point of interest of the workshop was once at the following issues: approach protection, threshold cryptography, protection, origin, and encryption.

Show description

Read or Download Advances in Information and Computer Security: 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings PDF

Best international_1 books

Metal–Ceramic Interfaces. Proceedings of an International Workshop

As engineering fabrics and constructions frequently comprise a steel or metal alloy bonded to a ceramic, the consequent interface has to be capable of maintain mechanical forces with out failure. additionally they play an enormous position in oxidation or aid of fabrics. The workshop on 'Bonding, constitution and Mechanical homes of Metal/Ceramic Interfaces' used to be held in January 1989 in the Acta/Scripta Metallurgica convention sequence.

Virtual Realities: International Dagstuhl Seminar, Dagstuhl Castle, Germany, June 9-14, 2013, Revised Selected Papers

Digital truth (VR) is a multidisciplinary quarter of study aimed toward interactive human–computer-mediated simulations of man-made environments. a big element of VR-based platforms is the stimulation of the human senses – often sight, sound, and contact – in one of these manner person feels a feeling of presence within the digital surroundings.

Extra info for Advances in Information and Computer Security: 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings

Sample text

For the next-process). Therefore, another method is needed. What is about to be written to the CR3 register is usable information for the acquisition of process information concerning the next-process. Considering this, there are three methods for identifying the next-process to acquire its process information. • Scanning method: this method scans the process list of the protection target VM to determine the next process. • List-based method: With this method, the VMM holds a list, containing the CR3 value and the address of the task_struct for each essential process.

The IDS offload method without modification is an effective approach. However, it is difficult to apply to general application because the method involves the emulation of each system call. To completely offload the IDS, it is necessary to emulate all system calls. However, complete emulation is difficult to implement. Even though effective VMM-based methods have been proposed, many of them cannot use existing software without modification. Moreover, exporting existing functions used by anti-virus software to a VMM is difficult.

Additionally, the name should be chosen randomly. It would be easy to detect the existence of the proposed method were the dummy information always the same. 2 Trigger for Replacement of Process Information To replace the process information, it is necessary to determine whether or not a process-switch from and a process-switch to are replacement targets. For this mechanism, the detection of context switches in a VM from a VMM is required. In fully virtualized environments, a guest OS works in VMX non-root mode and a VMM works in VMX root mode.

Download PDF sample

Rated 4.90 of 5 – based on 46 votes