Visible to the public Methods for building a trusted environment in Unix operating systems based on the implementation of a digital watermark

TitleMethods for building a trusted environment in Unix operating systems based on the implementation of a digital watermark
Publication TypeConference Paper
Year of Publication2020
AuthorsKrasov, A. V., Shterenberg, S. I.
Conference Name2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)
Date PublishedOct. 2020
PublisherIEEE
ISBN Number978-1-7281-9281-9
KeywordsAssembler, Certification Center, composability, DW, Linux, Linux operating system, Linux Operating System Security, Metrics, pubcrawl, resilience, Resiliency, trusted computing environment, Unix
AbstractAs a problematic, this article discusses the construction of a trusted computing environment (TCE) based on the introduction of digital watermarks (DW) into the modules of the software product of a Unix-like operating / Linux system (Linux OS). One of the threats faced by an information security operator is the illegal use of a program or its components by unscrupulous competitors as part of "foreign" programs. Thus, we are talking about the joint use of the license key and the DW, which can act as a comprehensive solution for protecting the Linux OS. The above confirms the relevance of creating a methodology for building a trusted environment in Unix-like based on the implementation of a digital watermark. In this paper, the parameters of using the digital watermark, the admissible memory of Unix-like systems are considered.
URLhttps://ieeexplore.ieee.org/document/9222413
DOI10.1109/ICUMT51630.2020.9222413
Citation Keykrasov_methods_2020