Trojan Integrity
Trojan Integrity
ABSTRACT
INTRODUCTION
It is difficult to argue that these kinds of attacks are not likely. The National
Computer Security Center writes.
"There are many systems in which integrity may be deemed more important
than confidentiality (e.g., educational record systems, flight-reservation
systems, medical records systems, financial systems, insurance systems,
personnel systems.) While it is important in many cases that the
confidentiality of information in these types of systems be preserved, it is of
crucial importance that this information not be tampered with or modified in
unauthorized ways. Also included in this categorization of systems are
embedded computer systems. These systems are components incorporated
to perform one or more specific (usually control) functions within a larger
system. They present a more unique aspect of the importance of integrity as
they may often have little or no human interface to aid in providing for
correct systems operation.
Many commercial replication mechanisms copy data values from the source
data item to its replicas and others only copy the command after an update
takes place. However, logical replication copies the command that caused
the source data item to change. The command is executed at each replica's
site and, because of one-copy serializability, results in the same new value
for the replica. If we assume a distinct provenance I for the software at each
site, then the Trojan horse will not be replicated at all sites. An attack must
compromise multiple, possibly heterogeneous, host programs, an unlikely
event in practical systems. Even if the attackers can succeed at every site,
the attack still may fail. If the Trojan horses are not able to deliberately
malfunction in a one-copy serializable fashion, their bogus values will
diverge. This can be ensured by restricting communication between the sites
to just the protocols needed to carry out the authorized replication. So we
can expect a scheme using n replicas to detect up to n-I cooperating Trojan
horses and possibly detect an Trojan horse attack.
Other Solutions
Our point here is not to present the techniques, but to establish the
existence of solutions, either researched or not investigated.
CONCLUSION
Alfaith C. Tapdasan
Rejane O. Bahunsua
Janelyn Baliling
Wilson Baculod
Bongbong Estrito
Jemar Bieni