Human-centric visual monitoring of multi-clients system behavior and BiT for trust computing
ABSTRACT This paper proposes the trusted platform board monitoring (TPBM) system that enabled effectively detecting and managing abnormal phenomenon based on the trusted platform board not only for security but also for multiple clients connected on the web. In other words, TPBM strengthens weak poi...
Gespeichert in:
Veröffentlicht in: | Security and communication networks 2014-10, Vol.7 (10), p.1441-1453 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 1453 |
---|---|
container_issue | 10 |
container_start_page | 1441 |
container_title | Security and communication networks |
container_volume | 7 |
creator | Song, Eun-Ha Yang, Su-Hyun Jeong, Young-Sik |
description | ABSTRACT
This paper proposes the trusted platform board monitoring (TPBM) system that enabled effectively detecting and managing abnormal phenomenon based on the trusted platform board not only for security but also for multiple clients connected on the web. In other words, TPBM strengthens weak points of the existing security and provides the function to monitor with human‐centric method not only system resources and process status for remote multi‐client systems that are operated based on hardware security but also behavior of multiple clients in the cloud computing environment. In addition, measuring instruction level behavior is potentially a more effective protection than a pure software approach. From program's run‐time behavior, system state safety can also be analyzed. However, dynamic characteristic of program trace also introduces challenges on what to measure and how to measure. To solve such problems, branch instruction trace (BiT) profiling tool is introduced to measure processor's instruction level run‐time behavior. However, the BiT has provided only the text results of logical error information but not the visual monitoring function by tracing abnormal branch at the level of instruction. In order to resolve this problem, this paper includes the human‐centric visual monitoring function for information on abnormal branch trace to TPBM. Copyright © 2012 John Wiley & Sons, Ltd.
This paper proposes the trusted platform board monitoring (TPBM) system that enabled effectively detecting and managing abnormal phenomenon based on the trusted platform board not only for security but also for multiple clients connected on the web. The branch instruction trace(BiT) has provided only the text results of logical error information but not the visual monitoring function by tracing the abnormal branch at the level of instruction. In order to resolve this problem, this paper includes the human‐centric visual monitoring function for information on abnormal branch trace to TPBM. |
doi_str_mv | 10.1002/sec.617 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1620062131</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1620062131</sourcerecordid><originalsourceid>FETCH-LOGICAL-c3227-ff415a230075a1037be418e17e32bfe0f323f5897e7cf6135ccd3c80d884b41c3</originalsourceid><addsrcrecordid>eNp10N9LwzAQB_AiCs4p_gsBHxSkM5e0TfeoYz8UnaATX4SQZYlmts1M2un-eyOVPQg-3T187rj7RtEx4B5gTC68kr0M2E7UgT7txxgI2d32kOxHB94vMc4gYUknepk0pahiqaraGYnWxjeiQKWtTG2dqV6R1ahsitrEsjABeeQ3vlYlmqs3sTbWIVEt0JWZIR362jW-RtKWq6YOw4fRnhaFV0e_tRs9jYazwSS-vR9fDy5vY0kJYbHWCaSCUIxZKgBTNlcJ5AqYomSuFdaUUJ3mfaaY1BnQVMoFlTle5HkyT0DSbnTW7l05-9EoX_PSeKmKQlTKNp5DRsLDBCgEevKHLm3jqnAdhzRLU8hYngV12irprPdOab5yphRuwwHzn5R5SJmHlIM8b-WnKdTmP8Yfh4NWx602IcOvrRbunWeMspQ_T8ecTRl-GN3ccaDfkC-L_A</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1565516786</pqid></control><display><type>article</type><title>Human-centric visual monitoring of multi-clients system behavior and BiT for trust computing</title><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><source>Alma/SFX Local Collection</source><creator>Song, Eun-Ha ; Yang, Su-Hyun ; Jeong, Young-Sik</creator><creatorcontrib>Song, Eun-Ha ; Yang, Su-Hyun ; Jeong, Young-Sik</creatorcontrib><description>ABSTRACT
This paper proposes the trusted platform board monitoring (TPBM) system that enabled effectively detecting and managing abnormal phenomenon based on the trusted platform board not only for security but also for multiple clients connected on the web. In other words, TPBM strengthens weak points of the existing security and provides the function to monitor with human‐centric method not only system resources and process status for remote multi‐client systems that are operated based on hardware security but also behavior of multiple clients in the cloud computing environment. In addition, measuring instruction level behavior is potentially a more effective protection than a pure software approach. From program's run‐time behavior, system state safety can also be analyzed. However, dynamic characteristic of program trace also introduces challenges on what to measure and how to measure. To solve such problems, branch instruction trace (BiT) profiling tool is introduced to measure processor's instruction level run‐time behavior. However, the BiT has provided only the text results of logical error information but not the visual monitoring function by tracing abnormal branch at the level of instruction. In order to resolve this problem, this paper includes the human‐centric visual monitoring function for information on abnormal branch trace to TPBM. Copyright © 2012 John Wiley & Sons, Ltd.
This paper proposes the trusted platform board monitoring (TPBM) system that enabled effectively detecting and managing abnormal phenomenon based on the trusted platform board not only for security but also for multiple clients connected on the web. The branch instruction trace(BiT) has provided only the text results of logical error information but not the visual monitoring function by tracing the abnormal branch at the level of instruction. In order to resolve this problem, this paper includes the human‐centric visual monitoring function for information on abnormal branch trace to TPBM.</description><identifier>ISSN: 1939-0114</identifier><identifier>EISSN: 1939-0122</identifier><identifier>DOI: 10.1002/sec.617</identifier><language>eng</language><publisher>London: Blackwell Publishing Ltd</publisher><subject>Boards ; branch prediction ; Clients ; Computer information security ; execution path ; human-centric trusted visual monitoring ; indirect branch ; Mathematical analysis ; Mathematical models ; Monitoring ; non-control data attack ; Platforms ; software attacks ; trusted platform module ; Visual</subject><ispartof>Security and communication networks, 2014-10, Vol.7 (10), p.1441-1453</ispartof><rights>Copyright © 2012 John Wiley & Sons, Ltd.</rights><rights>Copyright © 2014 John Wiley & Sons, Ltd.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c3227-ff415a230075a1037be418e17e32bfe0f323f5897e7cf6135ccd3c80d884b41c3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27901,27902</link.rule.ids></links><search><creatorcontrib>Song, Eun-Ha</creatorcontrib><creatorcontrib>Yang, Su-Hyun</creatorcontrib><creatorcontrib>Jeong, Young-Sik</creatorcontrib><title>Human-centric visual monitoring of multi-clients system behavior and BiT for trust computing</title><title>Security and communication networks</title><addtitle>Security Comm. Networks</addtitle><description>ABSTRACT
This paper proposes the trusted platform board monitoring (TPBM) system that enabled effectively detecting and managing abnormal phenomenon based on the trusted platform board not only for security but also for multiple clients connected on the web. In other words, TPBM strengthens weak points of the existing security and provides the function to monitor with human‐centric method not only system resources and process status for remote multi‐client systems that are operated based on hardware security but also behavior of multiple clients in the cloud computing environment. In addition, measuring instruction level behavior is potentially a more effective protection than a pure software approach. From program's run‐time behavior, system state safety can also be analyzed. However, dynamic characteristic of program trace also introduces challenges on what to measure and how to measure. To solve such problems, branch instruction trace (BiT) profiling tool is introduced to measure processor's instruction level run‐time behavior. However, the BiT has provided only the text results of logical error information but not the visual monitoring function by tracing abnormal branch at the level of instruction. In order to resolve this problem, this paper includes the human‐centric visual monitoring function for information on abnormal branch trace to TPBM. Copyright © 2012 John Wiley & Sons, Ltd.
This paper proposes the trusted platform board monitoring (TPBM) system that enabled effectively detecting and managing abnormal phenomenon based on the trusted platform board not only for security but also for multiple clients connected on the web. The branch instruction trace(BiT) has provided only the text results of logical error information but not the visual monitoring function by tracing the abnormal branch at the level of instruction. In order to resolve this problem, this paper includes the human‐centric visual monitoring function for information on abnormal branch trace to TPBM.</description><subject>Boards</subject><subject>branch prediction</subject><subject>Clients</subject><subject>Computer information security</subject><subject>execution path</subject><subject>human-centric trusted visual monitoring</subject><subject>indirect branch</subject><subject>Mathematical analysis</subject><subject>Mathematical models</subject><subject>Monitoring</subject><subject>non-control data attack</subject><subject>Platforms</subject><subject>software attacks</subject><subject>trusted platform module</subject><subject>Visual</subject><issn>1939-0114</issn><issn>1939-0122</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2014</creationdate><recordtype>article</recordtype><sourceid>BENPR</sourceid><recordid>eNp10N9LwzAQB_AiCs4p_gsBHxSkM5e0TfeoYz8UnaATX4SQZYlmts1M2un-eyOVPQg-3T187rj7RtEx4B5gTC68kr0M2E7UgT7txxgI2d32kOxHB94vMc4gYUknepk0pahiqaraGYnWxjeiQKWtTG2dqV6R1ahsitrEsjABeeQ3vlYlmqs3sTbWIVEt0JWZIR362jW-RtKWq6YOw4fRnhaFV0e_tRs9jYazwSS-vR9fDy5vY0kJYbHWCaSCUIxZKgBTNlcJ5AqYomSuFdaUUJ3mfaaY1BnQVMoFlTle5HkyT0DSbnTW7l05-9EoX_PSeKmKQlTKNp5DRsLDBCgEevKHLm3jqnAdhzRLU8hYngV12irprPdOab5yphRuwwHzn5R5SJmHlIM8b-WnKdTmP8Yfh4NWx602IcOvrRbunWeMspQ_T8ecTRl-GN3ccaDfkC-L_A</recordid><startdate>201410</startdate><enddate>201410</enddate><creator>Song, Eun-Ha</creator><creator>Yang, Su-Hyun</creator><creator>Jeong, Young-Sik</creator><general>Blackwell Publishing Ltd</general><general>Hindawi Limited</general><scope>BSCLL</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope></search><sort><creationdate>201410</creationdate><title>Human-centric visual monitoring of multi-clients system behavior and BiT for trust computing</title><author>Song, Eun-Ha ; Yang, Su-Hyun ; Jeong, Young-Sik</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c3227-ff415a230075a1037be418e17e32bfe0f323f5897e7cf6135ccd3c80d884b41c3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2014</creationdate><topic>Boards</topic><topic>branch prediction</topic><topic>Clients</topic><topic>Computer information security</topic><topic>execution path</topic><topic>human-centric trusted visual monitoring</topic><topic>indirect branch</topic><topic>Mathematical analysis</topic><topic>Mathematical models</topic><topic>Monitoring</topic><topic>non-control data attack</topic><topic>Platforms</topic><topic>software attacks</topic><topic>trusted platform module</topic><topic>Visual</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Song, Eun-Ha</creatorcontrib><creatorcontrib>Yang, Su-Hyun</creatorcontrib><creatorcontrib>Jeong, Young-Sik</creatorcontrib><collection>Istex</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection (ProQuest)</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Security and communication networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Song, Eun-Ha</au><au>Yang, Su-Hyun</au><au>Jeong, Young-Sik</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Human-centric visual monitoring of multi-clients system behavior and BiT for trust computing</atitle><jtitle>Security and communication networks</jtitle><addtitle>Security Comm. Networks</addtitle><date>2014-10</date><risdate>2014</risdate><volume>7</volume><issue>10</issue><spage>1441</spage><epage>1453</epage><pages>1441-1453</pages><issn>1939-0114</issn><eissn>1939-0122</eissn><abstract>ABSTRACT
This paper proposes the trusted platform board monitoring (TPBM) system that enabled effectively detecting and managing abnormal phenomenon based on the trusted platform board not only for security but also for multiple clients connected on the web. In other words, TPBM strengthens weak points of the existing security and provides the function to monitor with human‐centric method not only system resources and process status for remote multi‐client systems that are operated based on hardware security but also behavior of multiple clients in the cloud computing environment. In addition, measuring instruction level behavior is potentially a more effective protection than a pure software approach. From program's run‐time behavior, system state safety can also be analyzed. However, dynamic characteristic of program trace also introduces challenges on what to measure and how to measure. To solve such problems, branch instruction trace (BiT) profiling tool is introduced to measure processor's instruction level run‐time behavior. However, the BiT has provided only the text results of logical error information but not the visual monitoring function by tracing abnormal branch at the level of instruction. In order to resolve this problem, this paper includes the human‐centric visual monitoring function for information on abnormal branch trace to TPBM. Copyright © 2012 John Wiley & Sons, Ltd.
This paper proposes the trusted platform board monitoring (TPBM) system that enabled effectively detecting and managing abnormal phenomenon based on the trusted platform board not only for security but also for multiple clients connected on the web. The branch instruction trace(BiT) has provided only the text results of logical error information but not the visual monitoring function by tracing the abnormal branch at the level of instruction. In order to resolve this problem, this paper includes the human‐centric visual monitoring function for information on abnormal branch trace to TPBM.</abstract><cop>London</cop><pub>Blackwell Publishing Ltd</pub><doi>10.1002/sec.617</doi><tpages>13</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1939-0114 |
ispartof | Security and communication networks, 2014-10, Vol.7 (10), p.1441-1453 |
issn | 1939-0114 1939-0122 |
language | eng |
recordid | cdi_proquest_miscellaneous_1620062131 |
source | Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals; Alma/SFX Local Collection |
subjects | Boards branch prediction Clients Computer information security execution path human-centric trusted visual monitoring indirect branch Mathematical analysis Mathematical models Monitoring non-control data attack Platforms software attacks trusted platform module Visual |
title | Human-centric visual monitoring of multi-clients system behavior and BiT for trust computing |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-31T15%3A29%3A03IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Human-centric%20visual%20monitoring%20of%20multi-clients%20system%20behavior%20and%20BiT%20for%20trust%20computing&rft.jtitle=Security%20and%20communication%20networks&rft.au=Song,%20Eun-Ha&rft.date=2014-10&rft.volume=7&rft.issue=10&rft.spage=1441&rft.epage=1453&rft.pages=1441-1453&rft.issn=1939-0114&rft.eissn=1939-0122&rft_id=info:doi/10.1002/sec.617&rft_dat=%3Cproquest_cross%3E1620062131%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1565516786&rft_id=info:pmid/&rfr_iscdi=true |