Human-centric visual monitoring of multi-clients system behavior and BiT for trust computing

ABSTRACT This paper proposes the trusted platform board monitoring (TPBM) system that enabled effectively detecting and managing abnormal phenomenon based on the trusted platform board not only for security but also for multiple clients connected on the web. In other words, TPBM strengthens weak poi...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Security and communication networks 2014-10, Vol.7 (10), p.1441-1453
Hauptverfasser: Song, Eun-Ha, Yang, Su-Hyun, Jeong, Young-Sik
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 1453
container_issue 10
container_start_page 1441
container_title Security and communication networks
container_volume 7
creator Song, Eun-Ha
Yang, Su-Hyun
Jeong, Young-Sik
description ABSTRACT This paper proposes the trusted platform board monitoring (TPBM) system that enabled effectively detecting and managing abnormal phenomenon based on the trusted platform board not only for security but also for multiple clients connected on the web. In other words, TPBM strengthens weak points of the existing security and provides the function to monitor with human‐centric method not only system resources and process status for remote multi‐client systems that are operated based on hardware security but also behavior of multiple clients in the cloud computing environment. In addition, measuring instruction level behavior is potentially a more effective protection than a pure software approach. From program's run‐time behavior, system state safety can also be analyzed. However, dynamic characteristic of program trace also introduces challenges on what to measure and how to measure. To solve such problems, branch instruction trace (BiT) profiling tool is introduced to measure processor's instruction level run‐time behavior. However, the BiT has provided only the text results of logical error information but not the visual monitoring function by tracing abnormal branch at the level of instruction. In order to resolve this problem, this paper includes the human‐centric visual monitoring function for information on abnormal branch trace to TPBM. Copyright © 2012 John Wiley & Sons, Ltd. This paper proposes the trusted platform board monitoring (TPBM) system that enabled effectively detecting and managing abnormal phenomenon based on the trusted platform board not only for security but also for multiple clients connected on the web. The branch instruction trace(BiT) has provided only the text results of logical error information but not the visual monitoring function by tracing the abnormal branch at the level of instruction. In order to resolve this problem, this paper includes the human‐centric visual monitoring function for information on abnormal branch trace to TPBM.
doi_str_mv 10.1002/sec.617
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1620062131</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1620062131</sourcerecordid><originalsourceid>FETCH-LOGICAL-c3227-ff415a230075a1037be418e17e32bfe0f323f5897e7cf6135ccd3c80d884b41c3</originalsourceid><addsrcrecordid>eNp10N9LwzAQB_AiCs4p_gsBHxSkM5e0TfeoYz8UnaATX4SQZYlmts1M2un-eyOVPQg-3T187rj7RtEx4B5gTC68kr0M2E7UgT7txxgI2d32kOxHB94vMc4gYUknepk0pahiqaraGYnWxjeiQKWtTG2dqV6R1ahsitrEsjABeeQ3vlYlmqs3sTbWIVEt0JWZIR362jW-RtKWq6YOw4fRnhaFV0e_tRs9jYazwSS-vR9fDy5vY0kJYbHWCaSCUIxZKgBTNlcJ5AqYomSuFdaUUJ3mfaaY1BnQVMoFlTle5HkyT0DSbnTW7l05-9EoX_PSeKmKQlTKNp5DRsLDBCgEevKHLm3jqnAdhzRLU8hYngV12irprPdOab5yphRuwwHzn5R5SJmHlIM8b-WnKdTmP8Yfh4NWx602IcOvrRbunWeMspQ_T8ecTRl-GN3ccaDfkC-L_A</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1565516786</pqid></control><display><type>article</type><title>Human-centric visual monitoring of multi-clients system behavior and BiT for trust computing</title><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><source>Alma/SFX Local Collection</source><creator>Song, Eun-Ha ; Yang, Su-Hyun ; Jeong, Young-Sik</creator><creatorcontrib>Song, Eun-Ha ; Yang, Su-Hyun ; Jeong, Young-Sik</creatorcontrib><description>ABSTRACT This paper proposes the trusted platform board monitoring (TPBM) system that enabled effectively detecting and managing abnormal phenomenon based on the trusted platform board not only for security but also for multiple clients connected on the web. In other words, TPBM strengthens weak points of the existing security and provides the function to monitor with human‐centric method not only system resources and process status for remote multi‐client systems that are operated based on hardware security but also behavior of multiple clients in the cloud computing environment. In addition, measuring instruction level behavior is potentially a more effective protection than a pure software approach. From program's run‐time behavior, system state safety can also be analyzed. However, dynamic characteristic of program trace also introduces challenges on what to measure and how to measure. To solve such problems, branch instruction trace (BiT) profiling tool is introduced to measure processor's instruction level run‐time behavior. However, the BiT has provided only the text results of logical error information but not the visual monitoring function by tracing abnormal branch at the level of instruction. In order to resolve this problem, this paper includes the human‐centric visual monitoring function for information on abnormal branch trace to TPBM. Copyright © 2012 John Wiley &amp; Sons, Ltd. This paper proposes the trusted platform board monitoring (TPBM) system that enabled effectively detecting and managing abnormal phenomenon based on the trusted platform board not only for security but also for multiple clients connected on the web. The branch instruction trace(BiT) has provided only the text results of logical error information but not the visual monitoring function by tracing the abnormal branch at the level of instruction. In order to resolve this problem, this paper includes the human‐centric visual monitoring function for information on abnormal branch trace to TPBM.</description><identifier>ISSN: 1939-0114</identifier><identifier>EISSN: 1939-0122</identifier><identifier>DOI: 10.1002/sec.617</identifier><language>eng</language><publisher>London: Blackwell Publishing Ltd</publisher><subject>Boards ; branch prediction ; Clients ; Computer information security ; execution path ; human-centric trusted visual monitoring ; indirect branch ; Mathematical analysis ; Mathematical models ; Monitoring ; non-control data attack ; Platforms ; software attacks ; trusted platform module ; Visual</subject><ispartof>Security and communication networks, 2014-10, Vol.7 (10), p.1441-1453</ispartof><rights>Copyright © 2012 John Wiley &amp; Sons, Ltd.</rights><rights>Copyright © 2014 John Wiley &amp; Sons, Ltd.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c3227-ff415a230075a1037be418e17e32bfe0f323f5897e7cf6135ccd3c80d884b41c3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27901,27902</link.rule.ids></links><search><creatorcontrib>Song, Eun-Ha</creatorcontrib><creatorcontrib>Yang, Su-Hyun</creatorcontrib><creatorcontrib>Jeong, Young-Sik</creatorcontrib><title>Human-centric visual monitoring of multi-clients system behavior and BiT for trust computing</title><title>Security and communication networks</title><addtitle>Security Comm. Networks</addtitle><description>ABSTRACT This paper proposes the trusted platform board monitoring (TPBM) system that enabled effectively detecting and managing abnormal phenomenon based on the trusted platform board not only for security but also for multiple clients connected on the web. In other words, TPBM strengthens weak points of the existing security and provides the function to monitor with human‐centric method not only system resources and process status for remote multi‐client systems that are operated based on hardware security but also behavior of multiple clients in the cloud computing environment. In addition, measuring instruction level behavior is potentially a more effective protection than a pure software approach. From program's run‐time behavior, system state safety can also be analyzed. However, dynamic characteristic of program trace also introduces challenges on what to measure and how to measure. To solve such problems, branch instruction trace (BiT) profiling tool is introduced to measure processor's instruction level run‐time behavior. However, the BiT has provided only the text results of logical error information but not the visual monitoring function by tracing abnormal branch at the level of instruction. In order to resolve this problem, this paper includes the human‐centric visual monitoring function for information on abnormal branch trace to TPBM. Copyright © 2012 John Wiley &amp; Sons, Ltd. This paper proposes the trusted platform board monitoring (TPBM) system that enabled effectively detecting and managing abnormal phenomenon based on the trusted platform board not only for security but also for multiple clients connected on the web. The branch instruction trace(BiT) has provided only the text results of logical error information but not the visual monitoring function by tracing the abnormal branch at the level of instruction. In order to resolve this problem, this paper includes the human‐centric visual monitoring function for information on abnormal branch trace to TPBM.</description><subject>Boards</subject><subject>branch prediction</subject><subject>Clients</subject><subject>Computer information security</subject><subject>execution path</subject><subject>human-centric trusted visual monitoring</subject><subject>indirect branch</subject><subject>Mathematical analysis</subject><subject>Mathematical models</subject><subject>Monitoring</subject><subject>non-control data attack</subject><subject>Platforms</subject><subject>software attacks</subject><subject>trusted platform module</subject><subject>Visual</subject><issn>1939-0114</issn><issn>1939-0122</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2014</creationdate><recordtype>article</recordtype><sourceid>BENPR</sourceid><recordid>eNp10N9LwzAQB_AiCs4p_gsBHxSkM5e0TfeoYz8UnaATX4SQZYlmts1M2un-eyOVPQg-3T187rj7RtEx4B5gTC68kr0M2E7UgT7txxgI2d32kOxHB94vMc4gYUknepk0pahiqaraGYnWxjeiQKWtTG2dqV6R1ahsitrEsjABeeQ3vlYlmqs3sTbWIVEt0JWZIR362jW-RtKWq6YOw4fRnhaFV0e_tRs9jYazwSS-vR9fDy5vY0kJYbHWCaSCUIxZKgBTNlcJ5AqYomSuFdaUUJ3mfaaY1BnQVMoFlTle5HkyT0DSbnTW7l05-9EoX_PSeKmKQlTKNp5DRsLDBCgEevKHLm3jqnAdhzRLU8hYngV12irprPdOab5yphRuwwHzn5R5SJmHlIM8b-WnKdTmP8Yfh4NWx602IcOvrRbunWeMspQ_T8ecTRl-GN3ccaDfkC-L_A</recordid><startdate>201410</startdate><enddate>201410</enddate><creator>Song, Eun-Ha</creator><creator>Yang, Su-Hyun</creator><creator>Jeong, Young-Sik</creator><general>Blackwell Publishing Ltd</general><general>Hindawi Limited</general><scope>BSCLL</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope></search><sort><creationdate>201410</creationdate><title>Human-centric visual monitoring of multi-clients system behavior and BiT for trust computing</title><author>Song, Eun-Ha ; Yang, Su-Hyun ; Jeong, Young-Sik</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c3227-ff415a230075a1037be418e17e32bfe0f323f5897e7cf6135ccd3c80d884b41c3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2014</creationdate><topic>Boards</topic><topic>branch prediction</topic><topic>Clients</topic><topic>Computer information security</topic><topic>execution path</topic><topic>human-centric trusted visual monitoring</topic><topic>indirect branch</topic><topic>Mathematical analysis</topic><topic>Mathematical models</topic><topic>Monitoring</topic><topic>non-control data attack</topic><topic>Platforms</topic><topic>software attacks</topic><topic>trusted platform module</topic><topic>Visual</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Song, Eun-Ha</creatorcontrib><creatorcontrib>Yang, Su-Hyun</creatorcontrib><creatorcontrib>Jeong, Young-Sik</creatorcontrib><collection>Istex</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection (ProQuest)</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Security and communication networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Song, Eun-Ha</au><au>Yang, Su-Hyun</au><au>Jeong, Young-Sik</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Human-centric visual monitoring of multi-clients system behavior and BiT for trust computing</atitle><jtitle>Security and communication networks</jtitle><addtitle>Security Comm. Networks</addtitle><date>2014-10</date><risdate>2014</risdate><volume>7</volume><issue>10</issue><spage>1441</spage><epage>1453</epage><pages>1441-1453</pages><issn>1939-0114</issn><eissn>1939-0122</eissn><abstract>ABSTRACT This paper proposes the trusted platform board monitoring (TPBM) system that enabled effectively detecting and managing abnormal phenomenon based on the trusted platform board not only for security but also for multiple clients connected on the web. In other words, TPBM strengthens weak points of the existing security and provides the function to monitor with human‐centric method not only system resources and process status for remote multi‐client systems that are operated based on hardware security but also behavior of multiple clients in the cloud computing environment. In addition, measuring instruction level behavior is potentially a more effective protection than a pure software approach. From program's run‐time behavior, system state safety can also be analyzed. However, dynamic characteristic of program trace also introduces challenges on what to measure and how to measure. To solve such problems, branch instruction trace (BiT) profiling tool is introduced to measure processor's instruction level run‐time behavior. However, the BiT has provided only the text results of logical error information but not the visual monitoring function by tracing abnormal branch at the level of instruction. In order to resolve this problem, this paper includes the human‐centric visual monitoring function for information on abnormal branch trace to TPBM. Copyright © 2012 John Wiley &amp; Sons, Ltd. This paper proposes the trusted platform board monitoring (TPBM) system that enabled effectively detecting and managing abnormal phenomenon based on the trusted platform board not only for security but also for multiple clients connected on the web. The branch instruction trace(BiT) has provided only the text results of logical error information but not the visual monitoring function by tracing the abnormal branch at the level of instruction. In order to resolve this problem, this paper includes the human‐centric visual monitoring function for information on abnormal branch trace to TPBM.</abstract><cop>London</cop><pub>Blackwell Publishing Ltd</pub><doi>10.1002/sec.617</doi><tpages>13</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1939-0114
ispartof Security and communication networks, 2014-10, Vol.7 (10), p.1441-1453
issn 1939-0114
1939-0122
language eng
recordid cdi_proquest_miscellaneous_1620062131
source Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals; Alma/SFX Local Collection
subjects Boards
branch prediction
Clients
Computer information security
execution path
human-centric trusted visual monitoring
indirect branch
Mathematical analysis
Mathematical models
Monitoring
non-control data attack
Platforms
software attacks
trusted platform module
Visual
title Human-centric visual monitoring of multi-clients system behavior and BiT for trust computing
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-31T15%3A29%3A03IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Human-centric%20visual%20monitoring%20of%20multi-clients%20system%20behavior%20and%20BiT%20for%20trust%20computing&rft.jtitle=Security%20and%20communication%20networks&rft.au=Song,%20Eun-Ha&rft.date=2014-10&rft.volume=7&rft.issue=10&rft.spage=1441&rft.epage=1453&rft.pages=1441-1453&rft.issn=1939-0114&rft.eissn=1939-0122&rft_id=info:doi/10.1002/sec.617&rft_dat=%3Cproquest_cross%3E1620062131%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1565516786&rft_id=info:pmid/&rfr_iscdi=true