Data protection in memory using byte reordering

Hyun Jun Jang, Dae Won Hwang, Eul Gyu Im

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

With the explosive uses of Internet, personal information can be exposed to attackers through various attacks. API hooking based mechanisms or virtual machine based mechanisms are proposed to protect personal data stored in the memory. But these mechanisms require another application program and attackers can get around by developing their own device drivers. We propose a new memory reorganizing mechanism to protect memory. In our proposed mechanism, a user can define his or her own data types and can store data using his or her own data types so that data formats stored in actual memory have different forms.

Original languageEnglish
Title of host publicationIntelligence and Security Informatics - IEEE ISI 2008 International Workshops
Subtitle of host publicationPAISI, PACCF, and SOCO 2008, Proceedings
Pages62-68
Number of pages7
DOIs
StatePublished - 2008 Jul 1
EventIEEE International Conference on Intelligence and Security Informatics, ISI 2008 Workshops: PAISI, PACCF, and SOCO 2008 - Taipei, Taiwan, Province of China
Duration: 2008 Jun 172008 Jun 17

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5075 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

OtherIEEE International Conference on Intelligence and Security Informatics, ISI 2008 Workshops: PAISI, PACCF, and SOCO 2008
CountryTaiwan, Province of China
CityTaipei
Period08/06/1708/06/17

Fingerprint

Data privacy
Reordering
Data storage equipment
Application programming interfaces (API)
Application programs
Virtual Machine
Internet
Driver
Attack

Keywords

  • Data Protection
  • Information Security
  • Memory protection

Cite this

Jang, H. J., Hwang, D. W., & Im, E. G. (2008). Data protection in memory using byte reordering. In Intelligence and Security Informatics - IEEE ISI 2008 International Workshops: PAISI, PACCF, and SOCO 2008, Proceedings (pp. 62-68). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 5075 LNCS). https://doi.org/10.1007/978-3-540-69304-8_7
Jang, Hyun Jun ; Hwang, Dae Won ; Im, Eul Gyu. / Data protection in memory using byte reordering. Intelligence and Security Informatics - IEEE ISI 2008 International Workshops: PAISI, PACCF, and SOCO 2008, Proceedings. 2008. pp. 62-68 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{5829d37de42347ef8b25e09992b5c78c,
title = "Data protection in memory using byte reordering",
abstract = "With the explosive uses of Internet, personal information can be exposed to attackers through various attacks. API hooking based mechanisms or virtual machine based mechanisms are proposed to protect personal data stored in the memory. But these mechanisms require another application program and attackers can get around by developing their own device drivers. We propose a new memory reorganizing mechanism to protect memory. In our proposed mechanism, a user can define his or her own data types and can store data using his or her own data types so that data formats stored in actual memory have different forms.",
keywords = "Data Protection, Information Security, Memory protection",
author = "Jang, {Hyun Jun} and Hwang, {Dae Won} and Im, {Eul Gyu}",
year = "2008",
month = "7",
day = "1",
doi = "10.1007/978-3-540-69304-8_7",
language = "English",
isbn = "3540691367",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "62--68",
booktitle = "Intelligence and Security Informatics - IEEE ISI 2008 International Workshops",

}

Jang, HJ, Hwang, DW & Im, EG 2008, Data protection in memory using byte reordering. in Intelligence and Security Informatics - IEEE ISI 2008 International Workshops: PAISI, PACCF, and SOCO 2008, Proceedings. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 5075 LNCS, pp. 62-68, IEEE International Conference on Intelligence and Security Informatics, ISI 2008 Workshops: PAISI, PACCF, and SOCO 2008, Taipei, Taiwan, Province of China, 08/06/17. https://doi.org/10.1007/978-3-540-69304-8_7

Data protection in memory using byte reordering. / Jang, Hyun Jun; Hwang, Dae Won; Im, Eul Gyu.

Intelligence and Security Informatics - IEEE ISI 2008 International Workshops: PAISI, PACCF, and SOCO 2008, Proceedings. 2008. p. 62-68 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 5075 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Data protection in memory using byte reordering

AU - Jang, Hyun Jun

AU - Hwang, Dae Won

AU - Im, Eul Gyu

PY - 2008/7/1

Y1 - 2008/7/1

N2 - With the explosive uses of Internet, personal information can be exposed to attackers through various attacks. API hooking based mechanisms or virtual machine based mechanisms are proposed to protect personal data stored in the memory. But these mechanisms require another application program and attackers can get around by developing their own device drivers. We propose a new memory reorganizing mechanism to protect memory. In our proposed mechanism, a user can define his or her own data types and can store data using his or her own data types so that data formats stored in actual memory have different forms.

AB - With the explosive uses of Internet, personal information can be exposed to attackers through various attacks. API hooking based mechanisms or virtual machine based mechanisms are proposed to protect personal data stored in the memory. But these mechanisms require another application program and attackers can get around by developing their own device drivers. We propose a new memory reorganizing mechanism to protect memory. In our proposed mechanism, a user can define his or her own data types and can store data using his or her own data types so that data formats stored in actual memory have different forms.

KW - Data Protection

KW - Information Security

KW - Memory protection

UR - http://www.scopus.com/inward/record.url?scp=45849098722&partnerID=8YFLogxK

U2 - 10.1007/978-3-540-69304-8_7

DO - 10.1007/978-3-540-69304-8_7

M3 - Conference contribution

AN - SCOPUS:45849098722

SN - 3540691367

SN - 9783540691365

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 62

EP - 68

BT - Intelligence and Security Informatics - IEEE ISI 2008 International Workshops

ER -

Jang HJ, Hwang DW, Im EG. Data protection in memory using byte reordering. In Intelligence and Security Informatics - IEEE ISI 2008 International Workshops: PAISI, PACCF, and SOCO 2008, Proceedings. 2008. p. 62-68. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). https://doi.org/10.1007/978-3-540-69304-8_7