Dissertation > Excellent graduate degree dissertation topics show

The Research of Anti-Trojan Technology Based JAVA Bytecode

Author: AnWenLi
Tutor: WangMeiQin
School: Shandong University
Course: Information Security
Keywords: Trusted computing base TCB Bytecode injection BCI Data labels Anti- Trojan
CLC: TP393.08
Type: Master's thesis
Year: 2009
Downloads: 113
Quote: 0
Read: Download Dissertation


With the extensive application of the Internet and the rapid development of the threat posed by the safety defect exists in the software , Trojans and other malicious software on the system security and data security has become increasingly serious . The traditional method to solve this problem is ongoing safety defect exists , the software upgrade, kill the horse virus continue to analyze the characteristics of the endless stream of Trojan virus . This paper presents a brand new release a security threat to the anti- Trojan technology . The experimental model is no longer concerned about the application running on the system if there are safety defect or whether it is a Trojan virus , but the data underlying the protection of data security and system security . Through monitoring and control operation in the application of the present experimental model , analysis by the execution of the application program a result of information flow, and to ensure that the application is running in a predetermined strategy . Once these applications beyond the authorized illegal data access request will be subject to the control of the experimental model . Follow the trusted computing base TCB (Trusted Computing Base) architecture of the experimental model as a basis for the use of the JAVA virtual machine , using dynamic bytecode injection technology , explore JAVA bytecode stream - based anti- instantiate objects dynamically add data labels Trojan anti-malware technology provides data security protection method . The experimental model is based on the object granularity dynamically modify the JAVA virtual machine running JAVA applications running class file does not change the original class file itself . Object data labels are also added to the JAVA application execution process , the unloading of the termination of the application object , the object data labels automatically separated . Different from the mechanisms and strategies of the JAVA virtual machine that comes with this experimental model , it can be more widely to detect and control the execution of Java applications according to the rules specified . In addition , the experimental model does not rely on a specific JAVA virtual machine implementation that can be run on a virtual machine of any support JAVA Virtual Machine Tool Interface (JVMTI) .

Related Dissertations

  1. Personal Firewall using APIHOOK technology,TP393.08
  2. Computer Remote Control Technology,TP393.08
  3. Study on Data Annotation of Deep Web Data Integration System,TP393.09
  4. Research on Tolerating Trojan Intrusion Based on Blocking Characteristic Behavior,TP393.08
  5. Anti - Trojan technology research based on identity checks,TP393.08
  6. The Research of Malware Detection Technology Based on Active Mode,TP393.08
  7. Research on the Impact Analysis of Network Security Incidents Based on Simulation,TP393.08
  8. Topology Measurement and Security Analysis on Gnutella and eMule Network,TP393.08
  9. Implementation and Research of Illegal Websites Detection System Based on Comparison Methods,TP393.08
  10. Association rule mining based Intrusion Detection System Research and Implementation,TP393.08
  11. The Research on Intrusion Detection System Based on Machine Learning,TP393.08
  12. Design of Network Intrusion Detection System Based on FPGA,TP393.08
  13. Research of Key Technologies of Intrusion Detection Based on Computer Immune,TP393.08
  14. One based on pattern matching lightweight network intrusion detection system design and implementation,TP393.08
  15. Chain Enterprise Information Management System Design and Implementation of encryption technology,TP393.08
  16. Analysis on DDoS Attacks Detecting Technology Based on Eigenvector,TP393.08
  17. Analysis and improvement of several e-cash payment scheme,TP393.08
  18. The Research of Attack Source Traceback in Distributed Denial-of-Service Attacks Based on VoIP,TP393.08
  19. Ship mountain of e-government network security solutions outside the network design and implementation,TP393.08
  20. Research on Network Anomaly Detection Based on Projection Pursuit Regression,TP393.08
  21. Research on Checking and Digesting Policy Conflicts Under Multi-Policy Environments,TP393.08

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Security
© 2012 www.DissertationTopic.Net  Mobile