Securing Network Input via a Trusted Input Proxy

نویسندگان

  • Kevin Borders
  • Atul Prakash
چکیده

The increasing popularity of online transactions involving sensitive personal data, such as bank account and social security numbers, has created a huge security problem for today’s computer users. Malicious software (malware) that steals passwords and other critical user input has led to countless cases of identity theft and financial fraud. Client computers remain susceptible to key logging attacks due to inadequate defense against drive-by malware installation. Trusted browsing virtual machines attempt to mitigate this problem, but fail to protect against many runtime and Trojan horse malware attacks. One option for securely acquiring sensitive input is TPM-verified trusted execution. While this method promises to provide the best security, it has serious usability limitations and would require extensive modifications to both the client and the server. We propose a new approach for securing network input that relies on a Trusted Input Proxy (TIP). The TIP runs as a module in a virtual machine architecture that proxies secure network connections. When a user wishes to enter sensitive data, he or she presses an escape sequence that triggers the TIP to display a secure input dialog. The TIP will automatically generate a placeholder value based on the input using regular expression approximation (e.g. 123-45-6789 for a SSN). It will then send key presses for the placeholder to the application. Finally, the TIP will substitute actual data for placeholders as it relays network messages to the server. Although the Trusted Input Proxy approach relies on a slightly larger trusted code base, it requires no modifications to the server, very few to the client, and is far more usable than TPM-verified execution. In this paper, we present the initial design of a Trusted Input Proxy and compare its merits and shortcomings to those of other approaches.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Bump in the Ether: A Framework for Securing Sensitive User Input

We present Bump in the Ether (BitE), an approach for preventing user-space malware from accessing sensitive user input and providing the user with additional confidence that her input is being delivered to the expected application. Rather than preventing malware from running or detecting already-running malware, we facilitate user input that bypasses common avenues of attack. User input travers...

متن کامل

Bump in the Ether: Mobile Phones as Proxies for Sensitive Input

User-space malware such as keyboard sniffers, spyware, and Trojans represent a significant threat to today’s desktop computing environment. Users have little assurance that such malware cannot observe their input to a particular application. In this paper, we present Bump in the Ether (BitE), an approach for preventing malware from accessing sensitive user input and providing the user with addi...

متن کامل

Using Neural Network to Determine Input Excesses, Output Shortfalls and Efficiency of Dmus in Russell Mode

Data Envelopment Analysis (DEA) has two fundamental approaches for assessing theefficiency with different characteristics; radial and non-radial models. This paper isconcerned the non-radial model of Russell which is a non linear model. Conventional DEAfor a large dataset with many inputs/outputs would require huge computer resources in termsof memory and CPU time. Artificial Neural Network (AN...

متن کامل

Estimation of the mean grain size of mechanically induced Hydroxyapatite based bioceramics via artificial neural network

This study focuses on the estimation of the mean grain size of mechanically induced Hydroxyapatite (HA) through the artificial neural network (ANN) model. The mean grain size of HA and HA based nanocomposites at different milling parameters were obtained from previous studies. The data were trained and tested by the neural network modeling. Accordingly, all data (55 sets) were based on the mecha...

متن کامل

ESTIMATION OF GAS HOLDUP AND INPUT POWER IN FROTH FLOTATION USING ARTIFICIAL NEURAL NETWORK

Multivariable regression and artificial neural network procedures were used to modeling of the input power and gas holdup of flotation. The stepwise nonlinear equations have shown greater accuracy than linear ones where they can predict input power, and gas holdup with the correlation coefficients of 0.79 thereby 0.51 in the linear, and R2=0.88 versus 0.52 in the non linear, respectively. ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007