SlideShare a Scribd company logo
1 of 6
Download to read offline
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.5, October 2012
DOI : 10.5121/ijcseit.2012.2502 13
APPLICATION WHITELISTING: APPROACHES AND
CHALLENGES
Himanshu Pareek, Sandeep Romana and P R L Eswari
Centre for Development of Advanced Computing, Hyderabad, India
{himanshup, sandeepr, prleswari}@cdac.in
ABSTRACT
Malware is a continuously evolving problem for enterprise networks and home computers. Even security
aware users using updated security solutions fall into trap of zero day attacks. Moreover, blacklisting
based solutions suffer from problems of false positives and false negatives. From here, idea of Application
whitelisting was coined among security vendors and various solutions were evolved with same underlying
technology idea. This paper provides the details about design and implementation approaches and
discusses challenges while developing an effective whitelisting solution.
KEYWORDS
Malware, Application Whitelisting, Enterprise Network
1. INTRODUCTION
With increasing number of new malware [1] it is becoming difficult for traditional antiviruses
following blacklisting principle to detect them. To address this problem new approaches (among
which application whitelisting is one) are being developed. Application Whitelisting [2] is a
methodology where user chooses a set of applications to run from rather than blacklisting
applications as done by traditional antivirus software. The user might be a single PC user and
chooses the application set for one computer or it might be an administrator who chooses a large
set to run on the network. Whenever any application starts on a given computer, solution checks
whether this file is present in whitelist or not. If not then running a process using this file is
denied. Figure 1 compares three basic approaches for malware prevention.
Figure 1: Primary approaches for malware prevention
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.5, October 2012
14
Application whitelisting solutions use an underlying kernel module to scan the basic activity in
system. Scan engine compares application details with the database. General architecture for
centralized application whitelisting solution is presented in section 3. Approaches for
implementing a whitelisting solution is discussed in section 4. Usage of various parameters to
uniquely identify and whitelist an application is discussed in section 5. Challenges associated
with the effective implementation of application whitelisting solution are discussed in section 6.
2. RELATED WORK
Application Whitelisting looks promising at the first sight but researchers have argued its
feasibility and practicality. Kurt Wismer [3] mentioned that determining whether a program is
good or bad is itself an intractable problem. Dr. Vesselin Bontchev [4] discussed the problems of
global and local whitelists. Jim Beechey [5] describes the advantages of whitelisting and attacks
possible on such kind of systems and concludes that though application whitelisting is not a
panacea but still required to counter the evolving malware attacks. In this paper, we bring out two
different approaches of application whitelisting enforcement and lists out issues with application
whitelisting which should be taken care while deploying.
3. GENERAL ARCHITECTURE FOR A CENTRALIZED APPLICATION
WHITELISTING SOLUTION
Centralized Application Whitelisting Solution generally uses client-server architecture as given in
figure 2. Application Whitelisting Server helps to create and maintain database of application
whitelisting policies for various client machines of the network. Based on the policies, whitelist
and notifications would be sent to each of the network client machines. Enforcement agent at
client machine would allow execution of only those applications which are in the whitelist and
blocks all other applications. Client agent would update the log details to the server at regular
intervals of time for further analysis.
Figure 2: General Architecture for Centralized Application Whitelisting
4. TWO APPROACHES FOR WHITELISTING
In order to enforce the application whitelist at client machine, there are two general approaches as
described below.
1. Analyse the executable file at runtime during process creation
In this approach, client enforcement agent will have an intercepting module which looks for the
creation of new processes on the system. In case of any new process creation event, intercepting
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.5, October 2012
15
module communicates the details to another module which scans and checks whether this
executable file exists in the application whitelist of that client machine. In case if it is not a
whitelisted application, this module indicates to the user that this application is not allowed on
that machine. Figure 3 gives pictorial view of this approach. There are various methods for
implementing the intercepting module of client enforcement agent using process creation event.
List of methods used for detecting the process creation event on Windows platform are:
1. User mode hooking of CreateProcess using DLL injection (or CreateProcessAsUser and
CreateProcessWithLogon can also be hooked). For such injections detour library can also be used
[6].
2. User mode hooking of NtCreateSection using DLL injection.
3. Kernel mode hooking of NtCreateSection [7].
4. Using PsSetCreateProcessNotifyRoutineEx (Windows Vista onwards) [8].
5. Utilizing software restriction policies (provided with Microsoft windows).
Figure 3: Application Whitelisting Enforcement during Process Creation
2. Scan every file of file system and verify the details of executable file against
application whitelist of the client machine
In this approach, client enforcement agent first scans executable files and verifies them against
the application whitelist of that machine. In case if the file is not found in the application whitelist
of that machine, then it can be either deleted or quarantined.
Figure 4: Application Whitelisting Enforcement during File Write
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.5, October 2012
16
However quarantine is a better option as the user gets the files back for any future requirements.
In this approach, intercepting module should monitor and verify the details of any new executable
file entering into the machine. This approach is pictorially shown in figure 4. This module cannot
rely on file extensions, but should verify based on file format.
5. PARAMETERS FOR IDENTIFYING AN APPLICATION
In order to identify whether the application is a whitelisted application or not, parameters of the
executable file need to be verified with the details provided in application whitelist database. An
application can be identified easily with executable name and path but these details may vary on
different client machines and also applications can be replaced. For example winword.exe if
executed can be allowed or denied based on the executable name and path as provided in
application whitelist database. But hacker can simply put some malicious executable with the
same name and path in the file system. Since the name and path are matching malicious
executable will be whitelisted and allowed for execution. These parameters combined with Hash
and Publisher name would be a better approach for verifying the details of executable files.
Therefore four fields would be maintained for each entry in the application whitelist database.
Application signature is another parameter which can be used in application whitelisting. This
approach is similar to the method of detecting malware using their signatures [9]. For example
consider a signature taken from userdb.txt [10].
Figure 5: Signature which can identify a PE packed with VOB Protect
The signature shown in figure 5 identifies any executable which is packed using VOB ProtectCD
5. The signature shows seven bytes. If an executable file also contains same sequence of seven
bytes, scanning module will report success. Moreover this approach also states that the search
must start at entry point of the executable. Sometimes these signatures can contain wild card
characters also to skip a single or multiple bytes.
6. CHALLENGES
Though application whitelisting solutions are able to provide security from zero-day attacks, there
are various challenges in order to effectively implement these solutions.
1. Building Trusted Application Database
This is the main challenge while offering an application whitelisting solution. There are
two options to deal this challenge. First option is give the responsibility of building
trusted application database to administrator. He will be responsible for identifying,
verifying and whitelisting the applications. The other option is to depend on verified
database of trusted applications maintained by third party and administrator only has to
choose and approve them.
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.5, October 2012
17
2. Update and Patch Handling
Integration of Application Whitelisting with patch management is another important
challenge which the solutions should address. When an application is kept in the
whitelist, its identification parameters (either hash or signature) are stored. When the
update or patch is installed, application identification parameters will change, resulting
into whitelisting application being denied. This problem must be addressed by integrating
with a patch management solution and monitoring such update activities.
3. Publisher Certificate Forgery
With the current technology one can verify and also check the validity of digital signature
of an application but the challenge in application whitelisting solution is verification of
stolen certificates. There are many cases of malware using stolen certificates [11]. This
type of malware will clear the verification process, if security policy allows software
from a particular application vendor.
4. Performance Degradation with DLL Whitelisting
When application whitelisting is extended to include DLL (Dynamic Link Libraries)
whitelisting, there is considerable effect on performance when loading an application.
Though DLL whitelisting provides the added advantage of better security but considering
the performance degradation problem it’s a tough decision for application whitelisting
vendors to consider including DLL whitelisting in their solution.
5. Virtualization
Virtualization aides in administration, deployment and development tasks but also
exposes security threats. These include security threats to hypervisor, virtual OS and data
loss. Moreover if virtualization is not configured correctly in the network, users may
bypass the application control and device control. If any virtualization software is white
listed then administrator must make sure that application whitelisting client software is
installed in the virtual operating systems. Otherwise this will enable the user to run the
unauthorized applications. Moreover, if users can simply install their own new virtual
machines then it will bypass application whitelisting. This also enables the users to run
the unauthorized applications and devices.
7. CONCLUSION
Application whitelisting is evolving as a promising methodology to address the zero-day threat.
This methodology allows only whitelisted applications for execution, whereas all other
applications are blocked. This paper lists the design and implementation approaches for
application whitelisting solutions. Also discusses various challenges, in order to effectively
implement application whitelisting solutions.
REFERENCES
[1] Malware Statistics. AV-Test. http://www.av-test.org/en/statistics/malware/
[2] Dave Shackleford, "Application Whitelisting: Enhancing Host Security",
http://www.sans.org/reading_room/analysts_program/McAfee_09_App_Whitelisting.pdf, October
2009
[3] Kurt Wismer. The rise of whitelisting. Available from http://anti-virus-
rants.blogspot.com/2006/03/rise-of-whitelisting.html
[4] Dr Vesselin Bontchev. The dark side of whitelisting. Available from
http://www.virusbtn.com/virusbulletin/archive/2007/08/vb200708-whitelisting#citation.5
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.5, October 2012
18
[5] Jim Beechey. Application Whitelisting: Panacea or Propaganda.
http://www.sans.org/reading_room/whitepapers/application/application-whitelisting-panacea-
propaganda_33599
[6] Alex Abramov, "API Hooking with MS Detours", http://www.codeproject.com/Articles/30140/API-
Hooking-with-MS-Detours, Oct 2008
[7] Anton Bassov, "Hooking the native API and controlling process creation on a system-wide basis",
http://www.codeproject.com/Articles/11985/Hooking-the-native-API-and-controlling-process-cre,
October 2005
[8] Microsoft Dev Center - Hardware, "PsSetCreateProcessNotifyRoutineEx routine",
http://msdn.microsoft.com/en-us/library/windows/hardware/ff559953(v=vs.85).aspx, January 2012
[9] Nwokedi Idike and Aditya P. Mathur, "A Survey of Malware Detection Techniques", Technical
Report, Purdue University, 2007
[10] BoB / Team PEiD, "Signature Database", http://code.google.com/p/reverse-engineering-
scripts/downloads/detail?name=UserDB.TXT, February 2011
[11] Jarno Niemelä, "It's signed, therefore it's Clean, right?” CARO 2010
Authors
Himanshu Pareek has around six years of experience in developing and design of security
solutions related to small sized networks. He has research papers published on topics like
malware detection based on behaviour and application modelling.
Sandeep Romana has nearly 5 years of experience in the field of research and developing
of security software for desktop’s and small networks. His areas of research include
behavioral malware detection and application whitelisting
Mrs P.R.L. Eswari is currently working in e-Security team at Centre for Development of
Advanced Computing (C-DAC) Hyderabad. Her areas of interest include End Point
Security, Network Security, Operating Systems, Linux, Data Structures, Algorithms and
Design.

More Related Content

What's hot

Engineering Software Products: 7. security and privacy
Engineering Software Products: 7. security and privacyEngineering Software Products: 7. security and privacy
Engineering Software Products: 7. security and privacysoftware-engineering-book
 
Web Applications Assessment Tools: Comparison and Discussion
Web Applications Assessment Tools: Comparison and DiscussionWeb Applications Assessment Tools: Comparison and Discussion
Web Applications Assessment Tools: Comparison and DiscussionEECJOURNAL
 
survey on analysing the crash reports of software applications
survey on analysing the crash reports of software applicationssurvey on analysing the crash reports of software applications
survey on analysing the crash reports of software applicationsIRJET Journal
 
PROP - P ATRONAGE OF PHP W EB A PPLICATIONS
PROP - P ATRONAGE OF  PHP W EB  A PPLICATIONSPROP - P ATRONAGE OF  PHP W EB  A PPLICATIONS
PROP - P ATRONAGE OF PHP W EB A PPLICATIONSijcsit
 
Dynamic Taint Analysis Tools: A Review
Dynamic Taint Analysis Tools: A ReviewDynamic Taint Analysis Tools: A Review
Dynamic Taint Analysis Tools: A ReviewCSCJournals
 
Using Fuzzy Clustering and Software Metrics to Predict Faults in large Indust...
Using Fuzzy Clustering and Software Metrics to Predict Faults in large Indust...Using Fuzzy Clustering and Software Metrics to Predict Faults in large Indust...
Using Fuzzy Clustering and Software Metrics to Predict Faults in large Indust...IOSR Journals
 
Bug Tracking System (BTS)
Bug Tracking System (BTS)Bug Tracking System (BTS)
Bug Tracking System (BTS)IRJET Journal
 
Social Security Admin FISMA Audit
Social Security Admin FISMA AuditSocial Security Admin FISMA Audit
Social Security Admin FISMA AuditDavid Sweigert
 
Prevention of SQL Injection Attacks having XML Database
Prevention of SQL Injection Attacks having XML DatabasePrevention of SQL Injection Attacks having XML Database
Prevention of SQL Injection Attacks having XML DatabaseIOSR Journals
 
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.IRJET Journal
 
A deployment scenario a taxonomy mapping and keyword searching for the appl...
A deployment scenario   a taxonomy mapping and keyword searching for the appl...A deployment scenario   a taxonomy mapping and keyword searching for the appl...
A deployment scenario a taxonomy mapping and keyword searching for the appl...Conference Papers
 
Detection of Android Third Party Libraries based attacks
Detection of Android Third Party Libraries based attacksDetection of Android Third Party Libraries based attacks
Detection of Android Third Party Libraries based attacksAmina WADDIZ
 
CONTROLLING INFORMATION FLOWS DURING SOFTWARE DEVELOPMENT
CONTROLLING INFORMATION FLOWS DURING SOFTWARE DEVELOPMENT CONTROLLING INFORMATION FLOWS DURING SOFTWARE DEVELOPMENT
CONTROLLING INFORMATION FLOWS DURING SOFTWARE DEVELOPMENT ijsptm
 
Testing desktop application police station information management system
Testing desktop application police station information management systemTesting desktop application police station information management system
Testing desktop application police station information management systemSalam Shah
 
SECURING SOFTWARE DEVELOPMENT STAGES USING ASPECT-ORIENTATION CONCEPTS
SECURING SOFTWARE DEVELOPMENT STAGES USING ASPECT-ORIENTATION CONCEPTSSECURING SOFTWARE DEVELOPMENT STAGES USING ASPECT-ORIENTATION CONCEPTS
SECURING SOFTWARE DEVELOPMENT STAGES USING ASPECT-ORIENTATION CONCEPTSijseajournal
 

What's hot (18)

Engineering Software Products: 7. security and privacy
Engineering Software Products: 7. security and privacyEngineering Software Products: 7. security and privacy
Engineering Software Products: 7. security and privacy
 
Web Applications Assessment Tools: Comparison and Discussion
Web Applications Assessment Tools: Comparison and DiscussionWeb Applications Assessment Tools: Comparison and Discussion
Web Applications Assessment Tools: Comparison and Discussion
 
survey on analysing the crash reports of software applications
survey on analysing the crash reports of software applicationssurvey on analysing the crash reports of software applications
survey on analysing the crash reports of software applications
 
PROP - P ATRONAGE OF PHP W EB A PPLICATIONS
PROP - P ATRONAGE OF  PHP W EB  A PPLICATIONSPROP - P ATRONAGE OF  PHP W EB  A PPLICATIONS
PROP - P ATRONAGE OF PHP W EB A PPLICATIONS
 
Dynamic Taint Analysis Tools: A Review
Dynamic Taint Analysis Tools: A ReviewDynamic Taint Analysis Tools: A Review
Dynamic Taint Analysis Tools: A Review
 
Using Fuzzy Clustering and Software Metrics to Predict Faults in large Indust...
Using Fuzzy Clustering and Software Metrics to Predict Faults in large Indust...Using Fuzzy Clustering and Software Metrics to Predict Faults in large Indust...
Using Fuzzy Clustering and Software Metrics to Predict Faults in large Indust...
 
Bug Tracking System (BTS)
Bug Tracking System (BTS)Bug Tracking System (BTS)
Bug Tracking System (BTS)
 
Social Security Admin FISMA Audit
Social Security Admin FISMA AuditSocial Security Admin FISMA Audit
Social Security Admin FISMA Audit
 
Prevention of SQL Injection Attacks having XML Database
Prevention of SQL Injection Attacks having XML DatabasePrevention of SQL Injection Attacks having XML Database
Prevention of SQL Injection Attacks having XML Database
 
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
 
A deployment scenario a taxonomy mapping and keyword searching for the appl...
A deployment scenario   a taxonomy mapping and keyword searching for the appl...A deployment scenario   a taxonomy mapping and keyword searching for the appl...
A deployment scenario a taxonomy mapping and keyword searching for the appl...
 
Detection of Android Third Party Libraries based attacks
Detection of Android Third Party Libraries based attacksDetection of Android Third Party Libraries based attacks
Detection of Android Third Party Libraries based attacks
 
CONTROLLING INFORMATION FLOWS DURING SOFTWARE DEVELOPMENT
CONTROLLING INFORMATION FLOWS DURING SOFTWARE DEVELOPMENT CONTROLLING INFORMATION FLOWS DURING SOFTWARE DEVELOPMENT
CONTROLLING INFORMATION FLOWS DURING SOFTWARE DEVELOPMENT
 
J034057065
J034057065J034057065
J034057065
 
1780 1783
1780 17831780 1783
1780 1783
 
Testing desktop application police station information management system
Testing desktop application police station information management systemTesting desktop application police station information management system
Testing desktop application police station information management system
 
SECURING SOFTWARE DEVELOPMENT STAGES USING ASPECT-ORIENTATION CONCEPTS
SECURING SOFTWARE DEVELOPMENT STAGES USING ASPECT-ORIENTATION CONCEPTSSECURING SOFTWARE DEVELOPMENT STAGES USING ASPECT-ORIENTATION CONCEPTS
SECURING SOFTWARE DEVELOPMENT STAGES USING ASPECT-ORIENTATION CONCEPTS
 
RE thesis presentation
RE thesis presentationRE thesis presentation
RE thesis presentation
 

Similar to APPLICATION WHITELISTING: APPROACHES AND CHALLENGES

Unveiling Advanced Persistence Techniques Through Application Shimming and Co...
Unveiling Advanced Persistence Techniques Through Application Shimming and Co...Unveiling Advanced Persistence Techniques Through Application Shimming and Co...
Unveiling Advanced Persistence Techniques Through Application Shimming and Co...IJCNCJournal
 
Unveiling Advanced Persistence Techniques Through Application Shimming and Co...
Unveiling Advanced Persistence Techniques Through Application Shimming and Co...Unveiling Advanced Persistence Techniques Through Application Shimming and Co...
Unveiling Advanced Persistence Techniques Through Application Shimming and Co...IJCNCJournal
 
Software Assurance CSS321Security Static Ana.docx
Software Assurance CSS321Security Static Ana.docxSoftware Assurance CSS321Security Static Ana.docx
Software Assurance CSS321Security Static Ana.docxwhitneyleman54422
 
A Study on Vulnerability Management
A Study on Vulnerability ManagementA Study on Vulnerability Management
A Study on Vulnerability ManagementIRJET Journal
 
Standardizing Source Code Security Audits
Standardizing Source Code Security AuditsStandardizing Source Code Security Audits
Standardizing Source Code Security Auditsijseajournal
 
Vulnerability Management System
Vulnerability Management SystemVulnerability Management System
Vulnerability Management SystemIRJET Journal
 
Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...iosrjce
 
A SYSTEM FOR VALIDATING AND COMPARING HOST-BASED DDOS DETECTION MECHANISMS
A SYSTEM FOR VALIDATING AND COMPARING HOST-BASED DDOS DETECTION MECHANISMSA SYSTEM FOR VALIDATING AND COMPARING HOST-BASED DDOS DETECTION MECHANISMS
A SYSTEM FOR VALIDATING AND COMPARING HOST-BASED DDOS DETECTION MECHANISMSIJNSA Journal
 
A SYSTEM FOR VALIDATING AND COMPARING HOST-BASED DDOS DETECTION MECHANISMS
A SYSTEM FOR VALIDATING AND COMPARING HOST-BASED DDOS DETECTION MECHANISMSA SYSTEM FOR VALIDATING AND COMPARING HOST-BASED DDOS DETECTION MECHANISMS
A SYSTEM FOR VALIDATING AND COMPARING HOST-BASED DDOS DETECTION MECHANISMSIJNSA Journal
 
Running head UNPATCHED CLIENT SOFTWAREUNPATCHED CLIENT SOFTWARE.docx
Running head UNPATCHED CLIENT SOFTWAREUNPATCHED CLIENT SOFTWARE.docxRunning head UNPATCHED CLIENT SOFTWAREUNPATCHED CLIENT SOFTWARE.docx
Running head UNPATCHED CLIENT SOFTWAREUNPATCHED CLIENT SOFTWARE.docxtodd521
 
Building a Distributed Secure System on Multi-Agent Platform Depending on the...
Building a Distributed Secure System on Multi-Agent Platform Depending on the...Building a Distributed Secure System on Multi-Agent Platform Depending on the...
Building a Distributed Secure System on Multi-Agent Platform Depending on the...CSCJournals
 
Application of Data Mining Techniques for Improving Continuous Integration
Application of Data Mining Techniques for Improving Continuous IntegrationApplication of Data Mining Techniques for Improving Continuous Integration
Application of Data Mining Techniques for Improving Continuous IntegrationDr. Amarjeet Singh
 
Bt0081 software engineering
Bt0081 software engineeringBt0081 software engineering
Bt0081 software engineeringTechglyphs
 
CoreTrace Whitepaper: Whitelisting And Control Systems
CoreTrace Whitepaper: Whitelisting And Control SystemsCoreTrace Whitepaper: Whitelisting And Control Systems
CoreTrace Whitepaper: Whitelisting And Control SystemsCoreTrace Corporation
 
CoreTrace Whitepaper: Application Whitelisting And Energy Systems
CoreTrace Whitepaper: Application Whitelisting And Energy SystemsCoreTrace Whitepaper: Application Whitelisting And Energy Systems
CoreTrace Whitepaper: Application Whitelisting And Energy SystemsCoreTrace Corporation
 
Constructing a software requirements specification and design for electronic ...
Constructing a software requirements specification and design for electronic ...Constructing a software requirements specification and design for electronic ...
Constructing a software requirements specification and design for electronic ...Ra'Fat Al-Msie'deen
 
Defect effort prediction models in software maintenance projects
Defect  effort prediction models in software maintenance projectsDefect  effort prediction models in software maintenance projects
Defect effort prediction models in software maintenance projectsiaemedu
 

Similar to APPLICATION WHITELISTING: APPROACHES AND CHALLENGES (20)

Unveiling Advanced Persistence Techniques Through Application Shimming and Co...
Unveiling Advanced Persistence Techniques Through Application Shimming and Co...Unveiling Advanced Persistence Techniques Through Application Shimming and Co...
Unveiling Advanced Persistence Techniques Through Application Shimming and Co...
 
Unveiling Advanced Persistence Techniques Through Application Shimming and Co...
Unveiling Advanced Persistence Techniques Through Application Shimming and Co...Unveiling Advanced Persistence Techniques Through Application Shimming and Co...
Unveiling Advanced Persistence Techniques Through Application Shimming and Co...
 
Software Assurance CSS321Security Static Ana.docx
Software Assurance CSS321Security Static Ana.docxSoftware Assurance CSS321Security Static Ana.docx
Software Assurance CSS321Security Static Ana.docx
 
A Study on Vulnerability Management
A Study on Vulnerability ManagementA Study on Vulnerability Management
A Study on Vulnerability Management
 
A035401010
A035401010A035401010
A035401010
 
Standardizing Source Code Security Audits
Standardizing Source Code Security AuditsStandardizing Source Code Security Audits
Standardizing Source Code Security Audits
 
Vulnerability Management System
Vulnerability Management SystemVulnerability Management System
Vulnerability Management System
 
J017325660
J017325660J017325660
J017325660
 
Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...
 
A SYSTEM FOR VALIDATING AND COMPARING HOST-BASED DDOS DETECTION MECHANISMS
A SYSTEM FOR VALIDATING AND COMPARING HOST-BASED DDOS DETECTION MECHANISMSA SYSTEM FOR VALIDATING AND COMPARING HOST-BASED DDOS DETECTION MECHANISMS
A SYSTEM FOR VALIDATING AND COMPARING HOST-BASED DDOS DETECTION MECHANISMS
 
A SYSTEM FOR VALIDATING AND COMPARING HOST-BASED DDOS DETECTION MECHANISMS
A SYSTEM FOR VALIDATING AND COMPARING HOST-BASED DDOS DETECTION MECHANISMSA SYSTEM FOR VALIDATING AND COMPARING HOST-BASED DDOS DETECTION MECHANISMS
A SYSTEM FOR VALIDATING AND COMPARING HOST-BASED DDOS DETECTION MECHANISMS
 
Running head UNPATCHED CLIENT SOFTWAREUNPATCHED CLIENT SOFTWARE.docx
Running head UNPATCHED CLIENT SOFTWAREUNPATCHED CLIENT SOFTWARE.docxRunning head UNPATCHED CLIENT SOFTWAREUNPATCHED CLIENT SOFTWARE.docx
Running head UNPATCHED CLIENT SOFTWAREUNPATCHED CLIENT SOFTWARE.docx
 
05 extended report
05 extended report05 extended report
05 extended report
 
Building a Distributed Secure System on Multi-Agent Platform Depending on the...
Building a Distributed Secure System on Multi-Agent Platform Depending on the...Building a Distributed Secure System on Multi-Agent Platform Depending on the...
Building a Distributed Secure System on Multi-Agent Platform Depending on the...
 
Application of Data Mining Techniques for Improving Continuous Integration
Application of Data Mining Techniques for Improving Continuous IntegrationApplication of Data Mining Techniques for Improving Continuous Integration
Application of Data Mining Techniques for Improving Continuous Integration
 
Bt0081 software engineering
Bt0081 software engineeringBt0081 software engineering
Bt0081 software engineering
 
CoreTrace Whitepaper: Whitelisting And Control Systems
CoreTrace Whitepaper: Whitelisting And Control SystemsCoreTrace Whitepaper: Whitelisting And Control Systems
CoreTrace Whitepaper: Whitelisting And Control Systems
 
CoreTrace Whitepaper: Application Whitelisting And Energy Systems
CoreTrace Whitepaper: Application Whitelisting And Energy SystemsCoreTrace Whitepaper: Application Whitelisting And Energy Systems
CoreTrace Whitepaper: Application Whitelisting And Energy Systems
 
Constructing a software requirements specification and design for electronic ...
Constructing a software requirements specification and design for electronic ...Constructing a software requirements specification and design for electronic ...
Constructing a software requirements specification and design for electronic ...
 
Defect effort prediction models in software maintenance projects
Defect  effort prediction models in software maintenance projectsDefect  effort prediction models in software maintenance projects
Defect effort prediction models in software maintenance projects
 

More from IJCSEIT Journal

ANALYSIS OF EXISTING TRAILERS’ CONTAINER LOCK SYSTEMS
ANALYSIS OF EXISTING TRAILERS’ CONTAINER LOCK SYSTEMS ANALYSIS OF EXISTING TRAILERS’ CONTAINER LOCK SYSTEMS
ANALYSIS OF EXISTING TRAILERS’ CONTAINER LOCK SYSTEMS IJCSEIT Journal
 
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...IJCSEIT Journal
 
BIOMETRIC APPLICATION OF INTELLIGENT AGENTS IN FAKE DOCUMENT DETECTION OF JOB...
BIOMETRIC APPLICATION OF INTELLIGENT AGENTS IN FAKE DOCUMENT DETECTION OF JOB...BIOMETRIC APPLICATION OF INTELLIGENT AGENTS IN FAKE DOCUMENT DETECTION OF JOB...
BIOMETRIC APPLICATION OF INTELLIGENT AGENTS IN FAKE DOCUMENT DETECTION OF JOB...IJCSEIT Journal
 
FACE RECOGNITION USING DIFFERENT LOCAL FEATURES WITH DIFFERENT DISTANCE TECHN...
FACE RECOGNITION USING DIFFERENT LOCAL FEATURES WITH DIFFERENT DISTANCE TECHN...FACE RECOGNITION USING DIFFERENT LOCAL FEATURES WITH DIFFERENT DISTANCE TECHN...
FACE RECOGNITION USING DIFFERENT LOCAL FEATURES WITH DIFFERENT DISTANCE TECHN...IJCSEIT Journal
 
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...IJCSEIT Journal
 
PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DET...
PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DET...PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DET...
PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DET...IJCSEIT Journal
 
Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...
Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...
Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...IJCSEIT Journal
 
FUZZY WEIGHTED ASSOCIATIVE CLASSIFIER: A PREDICTIVE TECHNIQUE FOR HEALTH CARE...
FUZZY WEIGHTED ASSOCIATIVE CLASSIFIER: A PREDICTIVE TECHNIQUE FOR HEALTH CARE...FUZZY WEIGHTED ASSOCIATIVE CLASSIFIER: A PREDICTIVE TECHNIQUE FOR HEALTH CARE...
FUZZY WEIGHTED ASSOCIATIVE CLASSIFIER: A PREDICTIVE TECHNIQUE FOR HEALTH CARE...IJCSEIT Journal
 
GENDER RECOGNITION SYSTEM USING SPEECH SIGNAL
GENDER RECOGNITION SYSTEM USING SPEECH SIGNALGENDER RECOGNITION SYSTEM USING SPEECH SIGNAL
GENDER RECOGNITION SYSTEM USING SPEECH SIGNALIJCSEIT Journal
 
DETECTION OF CONCEALED WEAPONS IN X-RAY IMAGES USING FUZZY K-NN
DETECTION OF CONCEALED WEAPONS IN X-RAY IMAGES USING FUZZY K-NNDETECTION OF CONCEALED WEAPONS IN X-RAY IMAGES USING FUZZY K-NN
DETECTION OF CONCEALED WEAPONS IN X-RAY IMAGES USING FUZZY K-NNIJCSEIT Journal
 
META-HEURISTICS BASED ARF OPTIMIZATION FOR IMAGE RETRIEVAL
META-HEURISTICS BASED ARF OPTIMIZATION FOR IMAGE RETRIEVALMETA-HEURISTICS BASED ARF OPTIMIZATION FOR IMAGE RETRIEVAL
META-HEURISTICS BASED ARF OPTIMIZATION FOR IMAGE RETRIEVALIJCSEIT Journal
 
ERROR PERFORMANCE ANALYSIS USING COOPERATIVE CONTENTION-BASED ROUTING IN WIRE...
ERROR PERFORMANCE ANALYSIS USING COOPERATIVE CONTENTION-BASED ROUTING IN WIRE...ERROR PERFORMANCE ANALYSIS USING COOPERATIVE CONTENTION-BASED ROUTING IN WIRE...
ERROR PERFORMANCE ANALYSIS USING COOPERATIVE CONTENTION-BASED ROUTING IN WIRE...IJCSEIT Journal
 
M-FISH KARYOTYPING - A NEW APPROACH BASED ON WATERSHED TRANSFORM
M-FISH KARYOTYPING - A NEW APPROACH BASED ON WATERSHED TRANSFORMM-FISH KARYOTYPING - A NEW APPROACH BASED ON WATERSHED TRANSFORM
M-FISH KARYOTYPING - A NEW APPROACH BASED ON WATERSHED TRANSFORMIJCSEIT Journal
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESRANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESIJCSEIT Journal
 
A NOVEL WINDOW FUNCTION YIELDING SUPPRESSED MAINLOBE WIDTH AND MINIMUM SIDELO...
A NOVEL WINDOW FUNCTION YIELDING SUPPRESSED MAINLOBE WIDTH AND MINIMUM SIDELO...A NOVEL WINDOW FUNCTION YIELDING SUPPRESSED MAINLOBE WIDTH AND MINIMUM SIDELO...
A NOVEL WINDOW FUNCTION YIELDING SUPPRESSED MAINLOBE WIDTH AND MINIMUM SIDELO...IJCSEIT Journal
 
CSHURI – Modified HURI algorithm for Customer Segmentation and Transaction Pr...
CSHURI – Modified HURI algorithm for Customer Segmentation and Transaction Pr...CSHURI – Modified HURI algorithm for Customer Segmentation and Transaction Pr...
CSHURI – Modified HURI algorithm for Customer Segmentation and Transaction Pr...IJCSEIT Journal
 
AN EFFICIENT IMPLEMENTATION OF TRACKING USING KALMAN FILTER FOR UNDERWATER RO...
AN EFFICIENT IMPLEMENTATION OF TRACKING USING KALMAN FILTER FOR UNDERWATER RO...AN EFFICIENT IMPLEMENTATION OF TRACKING USING KALMAN FILTER FOR UNDERWATER RO...
AN EFFICIENT IMPLEMENTATION OF TRACKING USING KALMAN FILTER FOR UNDERWATER RO...IJCSEIT Journal
 
USING DATA MINING TECHNIQUES FOR DIAGNOSIS AND PROGNOSIS OF CANCER DISEASE
USING DATA MINING TECHNIQUES FOR DIAGNOSIS AND PROGNOSIS OF CANCER DISEASEUSING DATA MINING TECHNIQUES FOR DIAGNOSIS AND PROGNOSIS OF CANCER DISEASE
USING DATA MINING TECHNIQUES FOR DIAGNOSIS AND PROGNOSIS OF CANCER DISEASEIJCSEIT Journal
 
FACTORS AFFECTING ACCEPTANCE OF WEB-BASED TRAINING SYSTEM: USING EXTENDED UTA...
FACTORS AFFECTING ACCEPTANCE OF WEB-BASED TRAINING SYSTEM: USING EXTENDED UTA...FACTORS AFFECTING ACCEPTANCE OF WEB-BASED TRAINING SYSTEM: USING EXTENDED UTA...
FACTORS AFFECTING ACCEPTANCE OF WEB-BASED TRAINING SYSTEM: USING EXTENDED UTA...IJCSEIT Journal
 
PROBABILISTIC INTERPRETATION OF COMPLEX FUZZY SET
PROBABILISTIC INTERPRETATION OF COMPLEX FUZZY SETPROBABILISTIC INTERPRETATION OF COMPLEX FUZZY SET
PROBABILISTIC INTERPRETATION OF COMPLEX FUZZY SETIJCSEIT Journal
 

More from IJCSEIT Journal (20)

ANALYSIS OF EXISTING TRAILERS’ CONTAINER LOCK SYSTEMS
ANALYSIS OF EXISTING TRAILERS’ CONTAINER LOCK SYSTEMS ANALYSIS OF EXISTING TRAILERS’ CONTAINER LOCK SYSTEMS
ANALYSIS OF EXISTING TRAILERS’ CONTAINER LOCK SYSTEMS
 
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...
 
BIOMETRIC APPLICATION OF INTELLIGENT AGENTS IN FAKE DOCUMENT DETECTION OF JOB...
BIOMETRIC APPLICATION OF INTELLIGENT AGENTS IN FAKE DOCUMENT DETECTION OF JOB...BIOMETRIC APPLICATION OF INTELLIGENT AGENTS IN FAKE DOCUMENT DETECTION OF JOB...
BIOMETRIC APPLICATION OF INTELLIGENT AGENTS IN FAKE DOCUMENT DETECTION OF JOB...
 
FACE RECOGNITION USING DIFFERENT LOCAL FEATURES WITH DIFFERENT DISTANCE TECHN...
FACE RECOGNITION USING DIFFERENT LOCAL FEATURES WITH DIFFERENT DISTANCE TECHN...FACE RECOGNITION USING DIFFERENT LOCAL FEATURES WITH DIFFERENT DISTANCE TECHN...
FACE RECOGNITION USING DIFFERENT LOCAL FEATURES WITH DIFFERENT DISTANCE TECHN...
 
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...
 
PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DET...
PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DET...PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DET...
PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DET...
 
Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...
Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...
Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...
 
FUZZY WEIGHTED ASSOCIATIVE CLASSIFIER: A PREDICTIVE TECHNIQUE FOR HEALTH CARE...
FUZZY WEIGHTED ASSOCIATIVE CLASSIFIER: A PREDICTIVE TECHNIQUE FOR HEALTH CARE...FUZZY WEIGHTED ASSOCIATIVE CLASSIFIER: A PREDICTIVE TECHNIQUE FOR HEALTH CARE...
FUZZY WEIGHTED ASSOCIATIVE CLASSIFIER: A PREDICTIVE TECHNIQUE FOR HEALTH CARE...
 
GENDER RECOGNITION SYSTEM USING SPEECH SIGNAL
GENDER RECOGNITION SYSTEM USING SPEECH SIGNALGENDER RECOGNITION SYSTEM USING SPEECH SIGNAL
GENDER RECOGNITION SYSTEM USING SPEECH SIGNAL
 
DETECTION OF CONCEALED WEAPONS IN X-RAY IMAGES USING FUZZY K-NN
DETECTION OF CONCEALED WEAPONS IN X-RAY IMAGES USING FUZZY K-NNDETECTION OF CONCEALED WEAPONS IN X-RAY IMAGES USING FUZZY K-NN
DETECTION OF CONCEALED WEAPONS IN X-RAY IMAGES USING FUZZY K-NN
 
META-HEURISTICS BASED ARF OPTIMIZATION FOR IMAGE RETRIEVAL
META-HEURISTICS BASED ARF OPTIMIZATION FOR IMAGE RETRIEVALMETA-HEURISTICS BASED ARF OPTIMIZATION FOR IMAGE RETRIEVAL
META-HEURISTICS BASED ARF OPTIMIZATION FOR IMAGE RETRIEVAL
 
ERROR PERFORMANCE ANALYSIS USING COOPERATIVE CONTENTION-BASED ROUTING IN WIRE...
ERROR PERFORMANCE ANALYSIS USING COOPERATIVE CONTENTION-BASED ROUTING IN WIRE...ERROR PERFORMANCE ANALYSIS USING COOPERATIVE CONTENTION-BASED ROUTING IN WIRE...
ERROR PERFORMANCE ANALYSIS USING COOPERATIVE CONTENTION-BASED ROUTING IN WIRE...
 
M-FISH KARYOTYPING - A NEW APPROACH BASED ON WATERSHED TRANSFORM
M-FISH KARYOTYPING - A NEW APPROACH BASED ON WATERSHED TRANSFORMM-FISH KARYOTYPING - A NEW APPROACH BASED ON WATERSHED TRANSFORM
M-FISH KARYOTYPING - A NEW APPROACH BASED ON WATERSHED TRANSFORM
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESRANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
 
A NOVEL WINDOW FUNCTION YIELDING SUPPRESSED MAINLOBE WIDTH AND MINIMUM SIDELO...
A NOVEL WINDOW FUNCTION YIELDING SUPPRESSED MAINLOBE WIDTH AND MINIMUM SIDELO...A NOVEL WINDOW FUNCTION YIELDING SUPPRESSED MAINLOBE WIDTH AND MINIMUM SIDELO...
A NOVEL WINDOW FUNCTION YIELDING SUPPRESSED MAINLOBE WIDTH AND MINIMUM SIDELO...
 
CSHURI – Modified HURI algorithm for Customer Segmentation and Transaction Pr...
CSHURI – Modified HURI algorithm for Customer Segmentation and Transaction Pr...CSHURI – Modified HURI algorithm for Customer Segmentation and Transaction Pr...
CSHURI – Modified HURI algorithm for Customer Segmentation and Transaction Pr...
 
AN EFFICIENT IMPLEMENTATION OF TRACKING USING KALMAN FILTER FOR UNDERWATER RO...
AN EFFICIENT IMPLEMENTATION OF TRACKING USING KALMAN FILTER FOR UNDERWATER RO...AN EFFICIENT IMPLEMENTATION OF TRACKING USING KALMAN FILTER FOR UNDERWATER RO...
AN EFFICIENT IMPLEMENTATION OF TRACKING USING KALMAN FILTER FOR UNDERWATER RO...
 
USING DATA MINING TECHNIQUES FOR DIAGNOSIS AND PROGNOSIS OF CANCER DISEASE
USING DATA MINING TECHNIQUES FOR DIAGNOSIS AND PROGNOSIS OF CANCER DISEASEUSING DATA MINING TECHNIQUES FOR DIAGNOSIS AND PROGNOSIS OF CANCER DISEASE
USING DATA MINING TECHNIQUES FOR DIAGNOSIS AND PROGNOSIS OF CANCER DISEASE
 
FACTORS AFFECTING ACCEPTANCE OF WEB-BASED TRAINING SYSTEM: USING EXTENDED UTA...
FACTORS AFFECTING ACCEPTANCE OF WEB-BASED TRAINING SYSTEM: USING EXTENDED UTA...FACTORS AFFECTING ACCEPTANCE OF WEB-BASED TRAINING SYSTEM: USING EXTENDED UTA...
FACTORS AFFECTING ACCEPTANCE OF WEB-BASED TRAINING SYSTEM: USING EXTENDED UTA...
 
PROBABILISTIC INTERPRETATION OF COMPLEX FUZZY SET
PROBABILISTIC INTERPRETATION OF COMPLEX FUZZY SETPROBABILISTIC INTERPRETATION OF COMPLEX FUZZY SET
PROBABILISTIC INTERPRETATION OF COMPLEX FUZZY SET
 

Recently uploaded

Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 

Recently uploaded (20)

Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 

APPLICATION WHITELISTING: APPROACHES AND CHALLENGES

  • 1. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.5, October 2012 DOI : 10.5121/ijcseit.2012.2502 13 APPLICATION WHITELISTING: APPROACHES AND CHALLENGES Himanshu Pareek, Sandeep Romana and P R L Eswari Centre for Development of Advanced Computing, Hyderabad, India {himanshup, sandeepr, prleswari}@cdac.in ABSTRACT Malware is a continuously evolving problem for enterprise networks and home computers. Even security aware users using updated security solutions fall into trap of zero day attacks. Moreover, blacklisting based solutions suffer from problems of false positives and false negatives. From here, idea of Application whitelisting was coined among security vendors and various solutions were evolved with same underlying technology idea. This paper provides the details about design and implementation approaches and discusses challenges while developing an effective whitelisting solution. KEYWORDS Malware, Application Whitelisting, Enterprise Network 1. INTRODUCTION With increasing number of new malware [1] it is becoming difficult for traditional antiviruses following blacklisting principle to detect them. To address this problem new approaches (among which application whitelisting is one) are being developed. Application Whitelisting [2] is a methodology where user chooses a set of applications to run from rather than blacklisting applications as done by traditional antivirus software. The user might be a single PC user and chooses the application set for one computer or it might be an administrator who chooses a large set to run on the network. Whenever any application starts on a given computer, solution checks whether this file is present in whitelist or not. If not then running a process using this file is denied. Figure 1 compares three basic approaches for malware prevention. Figure 1: Primary approaches for malware prevention
  • 2. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.5, October 2012 14 Application whitelisting solutions use an underlying kernel module to scan the basic activity in system. Scan engine compares application details with the database. General architecture for centralized application whitelisting solution is presented in section 3. Approaches for implementing a whitelisting solution is discussed in section 4. Usage of various parameters to uniquely identify and whitelist an application is discussed in section 5. Challenges associated with the effective implementation of application whitelisting solution are discussed in section 6. 2. RELATED WORK Application Whitelisting looks promising at the first sight but researchers have argued its feasibility and practicality. Kurt Wismer [3] mentioned that determining whether a program is good or bad is itself an intractable problem. Dr. Vesselin Bontchev [4] discussed the problems of global and local whitelists. Jim Beechey [5] describes the advantages of whitelisting and attacks possible on such kind of systems and concludes that though application whitelisting is not a panacea but still required to counter the evolving malware attacks. In this paper, we bring out two different approaches of application whitelisting enforcement and lists out issues with application whitelisting which should be taken care while deploying. 3. GENERAL ARCHITECTURE FOR A CENTRALIZED APPLICATION WHITELISTING SOLUTION Centralized Application Whitelisting Solution generally uses client-server architecture as given in figure 2. Application Whitelisting Server helps to create and maintain database of application whitelisting policies for various client machines of the network. Based on the policies, whitelist and notifications would be sent to each of the network client machines. Enforcement agent at client machine would allow execution of only those applications which are in the whitelist and blocks all other applications. Client agent would update the log details to the server at regular intervals of time for further analysis. Figure 2: General Architecture for Centralized Application Whitelisting 4. TWO APPROACHES FOR WHITELISTING In order to enforce the application whitelist at client machine, there are two general approaches as described below. 1. Analyse the executable file at runtime during process creation In this approach, client enforcement agent will have an intercepting module which looks for the creation of new processes on the system. In case of any new process creation event, intercepting
  • 3. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.5, October 2012 15 module communicates the details to another module which scans and checks whether this executable file exists in the application whitelist of that client machine. In case if it is not a whitelisted application, this module indicates to the user that this application is not allowed on that machine. Figure 3 gives pictorial view of this approach. There are various methods for implementing the intercepting module of client enforcement agent using process creation event. List of methods used for detecting the process creation event on Windows platform are: 1. User mode hooking of CreateProcess using DLL injection (or CreateProcessAsUser and CreateProcessWithLogon can also be hooked). For such injections detour library can also be used [6]. 2. User mode hooking of NtCreateSection using DLL injection. 3. Kernel mode hooking of NtCreateSection [7]. 4. Using PsSetCreateProcessNotifyRoutineEx (Windows Vista onwards) [8]. 5. Utilizing software restriction policies (provided with Microsoft windows). Figure 3: Application Whitelisting Enforcement during Process Creation 2. Scan every file of file system and verify the details of executable file against application whitelist of the client machine In this approach, client enforcement agent first scans executable files and verifies them against the application whitelist of that machine. In case if the file is not found in the application whitelist of that machine, then it can be either deleted or quarantined. Figure 4: Application Whitelisting Enforcement during File Write
  • 4. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.5, October 2012 16 However quarantine is a better option as the user gets the files back for any future requirements. In this approach, intercepting module should monitor and verify the details of any new executable file entering into the machine. This approach is pictorially shown in figure 4. This module cannot rely on file extensions, but should verify based on file format. 5. PARAMETERS FOR IDENTIFYING AN APPLICATION In order to identify whether the application is a whitelisted application or not, parameters of the executable file need to be verified with the details provided in application whitelist database. An application can be identified easily with executable name and path but these details may vary on different client machines and also applications can be replaced. For example winword.exe if executed can be allowed or denied based on the executable name and path as provided in application whitelist database. But hacker can simply put some malicious executable with the same name and path in the file system. Since the name and path are matching malicious executable will be whitelisted and allowed for execution. These parameters combined with Hash and Publisher name would be a better approach for verifying the details of executable files. Therefore four fields would be maintained for each entry in the application whitelist database. Application signature is another parameter which can be used in application whitelisting. This approach is similar to the method of detecting malware using their signatures [9]. For example consider a signature taken from userdb.txt [10]. Figure 5: Signature which can identify a PE packed with VOB Protect The signature shown in figure 5 identifies any executable which is packed using VOB ProtectCD 5. The signature shows seven bytes. If an executable file also contains same sequence of seven bytes, scanning module will report success. Moreover this approach also states that the search must start at entry point of the executable. Sometimes these signatures can contain wild card characters also to skip a single or multiple bytes. 6. CHALLENGES Though application whitelisting solutions are able to provide security from zero-day attacks, there are various challenges in order to effectively implement these solutions. 1. Building Trusted Application Database This is the main challenge while offering an application whitelisting solution. There are two options to deal this challenge. First option is give the responsibility of building trusted application database to administrator. He will be responsible for identifying, verifying and whitelisting the applications. The other option is to depend on verified database of trusted applications maintained by third party and administrator only has to choose and approve them.
  • 5. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.5, October 2012 17 2. Update and Patch Handling Integration of Application Whitelisting with patch management is another important challenge which the solutions should address. When an application is kept in the whitelist, its identification parameters (either hash or signature) are stored. When the update or patch is installed, application identification parameters will change, resulting into whitelisting application being denied. This problem must be addressed by integrating with a patch management solution and monitoring such update activities. 3. Publisher Certificate Forgery With the current technology one can verify and also check the validity of digital signature of an application but the challenge in application whitelisting solution is verification of stolen certificates. There are many cases of malware using stolen certificates [11]. This type of malware will clear the verification process, if security policy allows software from a particular application vendor. 4. Performance Degradation with DLL Whitelisting When application whitelisting is extended to include DLL (Dynamic Link Libraries) whitelisting, there is considerable effect on performance when loading an application. Though DLL whitelisting provides the added advantage of better security but considering the performance degradation problem it’s a tough decision for application whitelisting vendors to consider including DLL whitelisting in their solution. 5. Virtualization Virtualization aides in administration, deployment and development tasks but also exposes security threats. These include security threats to hypervisor, virtual OS and data loss. Moreover if virtualization is not configured correctly in the network, users may bypass the application control and device control. If any virtualization software is white listed then administrator must make sure that application whitelisting client software is installed in the virtual operating systems. Otherwise this will enable the user to run the unauthorized applications. Moreover, if users can simply install their own new virtual machines then it will bypass application whitelisting. This also enables the users to run the unauthorized applications and devices. 7. CONCLUSION Application whitelisting is evolving as a promising methodology to address the zero-day threat. This methodology allows only whitelisted applications for execution, whereas all other applications are blocked. This paper lists the design and implementation approaches for application whitelisting solutions. Also discusses various challenges, in order to effectively implement application whitelisting solutions. REFERENCES [1] Malware Statistics. AV-Test. http://www.av-test.org/en/statistics/malware/ [2] Dave Shackleford, "Application Whitelisting: Enhancing Host Security", http://www.sans.org/reading_room/analysts_program/McAfee_09_App_Whitelisting.pdf, October 2009 [3] Kurt Wismer. The rise of whitelisting. Available from http://anti-virus- rants.blogspot.com/2006/03/rise-of-whitelisting.html [4] Dr Vesselin Bontchev. The dark side of whitelisting. Available from http://www.virusbtn.com/virusbulletin/archive/2007/08/vb200708-whitelisting#citation.5
  • 6. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.5, October 2012 18 [5] Jim Beechey. Application Whitelisting: Panacea or Propaganda. http://www.sans.org/reading_room/whitepapers/application/application-whitelisting-panacea- propaganda_33599 [6] Alex Abramov, "API Hooking with MS Detours", http://www.codeproject.com/Articles/30140/API- Hooking-with-MS-Detours, Oct 2008 [7] Anton Bassov, "Hooking the native API and controlling process creation on a system-wide basis", http://www.codeproject.com/Articles/11985/Hooking-the-native-API-and-controlling-process-cre, October 2005 [8] Microsoft Dev Center - Hardware, "PsSetCreateProcessNotifyRoutineEx routine", http://msdn.microsoft.com/en-us/library/windows/hardware/ff559953(v=vs.85).aspx, January 2012 [9] Nwokedi Idike and Aditya P. Mathur, "A Survey of Malware Detection Techniques", Technical Report, Purdue University, 2007 [10] BoB / Team PEiD, "Signature Database", http://code.google.com/p/reverse-engineering- scripts/downloads/detail?name=UserDB.TXT, February 2011 [11] Jarno Niemelä, "It's signed, therefore it's Clean, right?” CARO 2010 Authors Himanshu Pareek has around six years of experience in developing and design of security solutions related to small sized networks. He has research papers published on topics like malware detection based on behaviour and application modelling. Sandeep Romana has nearly 5 years of experience in the field of research and developing of security software for desktop’s and small networks. His areas of research include behavioral malware detection and application whitelisting Mrs P.R.L. Eswari is currently working in e-Security team at Centre for Development of Advanced Computing (C-DAC) Hyderabad. Her areas of interest include End Point Security, Network Security, Operating Systems, Linux, Data Structures, Algorithms and Design.