Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
A novel computer architecture to prevent destruction by viruses: volume management and system tuning
Qingshi G., Yue H., Lei L., Xu C., Honglan L. Journal of Computer Science and Technology17 (3):241-248,2002.Type:Article
Date Reviewed: Jun 25 2003

Described in this paper is a trusted computer environment for PCs that are connected to the Internet, or that receive input from unknown sources.

The proposed architecture for this secure environment requires additional registers on the central processing unit (CPU) and changes in firmware, and probably software, to handle one or more security bits. These bits indicate the security level on all registers, memory, and hard disks. The architecture also requires special equipment used to assign security codes (based on the number of security bits used) to input and output ports. Data and executables are assigned a security level based on the input port by which they enter the PC. That security code is used to determine if code can be run in, or data manipulated in, certain registers. If the executable or data has a lower security code than that of the registers, an interrupt occurs.

I could not determine from this paper if the architecture would ever let any code or data downloaded from the Internet run to completion. The authors mention that many downloads are safe to use, but there is presently no way of differentiating between trusted and untrusted sources. Even untrusted sources may provide safe executables and data.

This paper is incomplete. The proposed architecture is expensive (contrary to the authors assertion), and requires a redesign of many PC components. The architecture will remain impractical until a detailed implementation plan, including security policies, is created. Even then, it may not be cost-effective.

Reviewer:  Anthony Donald Vanker Review #: CR127859 (0310-1098)
Bookmark and Share
 
Invasive Software (D.4.6 ... )
 
 
Invasive Software (K.6.5 ... )
 
 
Security and Protection (C.2.0 ... )
 
 
System Architectures (C.0 ... )
 
 
General (C.0 )
 
Would you recommend this review?
yes
no
Other reviews under "Invasive Software": Date
Defense and detection strategies against Internet worms
Nazario J., Artech House, Inc., Norwood, MA, 2003. Type: Book (9781580535373)
Sep 23 2004
Abstraction-based intrusion detection in distributed environments
Ning P. (ed), Jajodia S., Wang X. ACM Transactions on Information and System Security 4(4): 407-452, 2001. Type: Article
Jun 24 2002
Hop integrity: a defense against denial-of-service attacks (Advances in Information Security)
Huang C., Gouda M., Springer-Verlag New York, Inc., Secaucus, NJ, 2005.  112, Type: Book (9780387244266)
Sep 26 2006
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy