An Architecture for On-the-Fly File Integrity Checking


There are several ways for an intruder to obtain access to a remote computing system, such as exploiting program vulnerabilities, stealing passwords, and so. The intruder can modify system utilities in order to hide his/her presence and to guarantee an open backdoor to the system. Many techniques have been proposed to detect unauthorized file modifications… (More)
DOI: 10.1007/978-3-540-45214-0_11

4 Figures and Tables


  • Presentations referencing similar topics