| 研究生: |
鄭君浩 Jiun, Hao-Zheng |
|---|---|
| 論文名稱: |
An Integrated System of Personal Computer and Mobile Device for Protecting Sensitive Information 一個保護私密檔案的個人電腦與行動裝置整合系統 |
| 指導教授: |
孫宏民
Sun, Hung-Min |
| 口試委員: |
孫宏民
顏嵩銘 洪國寶 |
| 學位類別: |
碩士 Master |
| 系所名稱: |
電機資訊學院 - 資訊工程學系 Computer Science |
| 論文出版年: | 2011 |
| 畢業學年度: | 99 |
| 語文別: | 英文 |
| 論文頁數: | 39 |
| 中文關鍵詞: | 資料安全 、Key logger |
| 相關次數: | 點閱:108 下載:0 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
由於網路功能現今已經成為個人電腦必備的功能之一,根據國際電信聯盟(International Telecommunication Union, ITU) 於2011提出的一份統計資料顯示,目前全球網路的使用人口已經突破20億大關,使用者皆可輕易的在網路上下載取得需要的網路資源,只要使用者有使用網路的行為就有遭受Malicious Software攻擊的風險,讓潛伏在網路中的駭客(hacker)有機可趁,植入惡意程式,例如:木馬程式(Trojan horse)、鍵盤側錄程式(Keyboard logger)以及各種惡意間諜程式。這些惡意的攻擊極有可能藉此癱瘓或監控使用者的電腦,導致使用者重要的帳號及密碼資訊外洩,或是使得電腦中機密檔案被竊取的可能性大增。
並且根據ITU的同一份調查資料,統計資料顯示出目前全球使用個人行動裝置(包含個人數位助理(PDA)、行動電話、平板電腦以及智慧型手機等等)。的用戶更是達到了50億的數字,與2000年相比成長的約五倍之多。由於個人行動裝置的處理功能性可比擬小型電腦以及擁有普及化的優點,在本篇論文中,提出一個基於機密資料保護的方法,防止重要檔案被惡意程式破壞以及降低被竊取的風險。
[1] Wang, X. and Yu, Q. (2009),\A block encryption algorithm based on dynamic
sequences of multiple chaotic systems". Communications in Nonlinear Science
and Numerical Simulation,574-581
[2] Qiao, L. and Nahrstedt, K.(1998), \A new algorithm for MPEG video encryp-
tion". Proceedings of The First International Conference on Imaging Science,
Systems, and Technology
[3] Rahman, S.M.M. and Hossain, M.A. and Mouftah, H. and El Saddik, A.
and Okamoto, E. (2010), \A real-time privacy-sensitive data hiding approach
based on chaos cryptography". Multimedia and Expo (ICME), 2010 IEEE
International Conference on,72-77
[4] Artz, D. (2001), \Digital steganography: hiding data within data". internet
computing, IEEE,75-80
[5] Independent Tests of Anti-Virus Software, Retrospective/Proactive Test
http://www.av-comparatives.org/en/comparativesreviews/
detection-test
[6] International Telecommunication Union, StatShot News
http://www.itu.int/net/pressoffice/stats/2011/01/index.aspx
[7] Joan Daemen,Vincent Rijmen, \AES proposalRijndael.",1999, available at
Web
http://csrc.nist.gov/encryption/aes/rijndael/Rijndael.pdf
[8] National Institute of Standards and Technology (NIST), CSRC Website
http://csrc.nist.gov/archive/aes/index.html
[9] National Institute of Standards and Technology (NIST), Commerce Secretary
Announces New Standard for Global Information Security
http://www.nist.gov/public_affairs/releases/g01-111.cfm
[10] M. Xu, B. Salami, and C. Obimbo (2005), \How to Protect Personal Infor-
mation against Keyloggers". Proceeding of Internet and Multimedia Systems,
and Applications(IMSA05),275-280
[11] Phishing Activity Trends, Monthly Report, Anti-Phishing Working Group,
January 2008
[12] Oliveira, S.R.M. and Za
"ane, O.R.(2003), \Protecting sensitive knowledge by data sanitization",
Data Mining, 2003. ICDM 2003. Third IEEE International Conference on,
613-616
[13] Doja, M.N.; Kumar, N. (2008),\Image Authentication Schemes against Key-
Logger Spyware."
[14] Muhammad Aslam, Rana Naveed Idrees, Mirza Muzammil Baig, and Muham-
mad Asif Arshad(2004), \Anti-Hook Shield against the Software Key Log-
gers."
[15] Jun Fu; Yiwen Liang; Chengyu Tan; Xiaofei Xiong(2010), \Detecting Soft-
ware Keyloggers with Dendritic Cell Algorithm". International Conference
on Communications and Mobile Computing
[16] TAKAMI TOMOHIRO; SUZUKI KOICHI; BABA TATSUYA; MAEDA
SHUSUKE; MATSUMOTO TAKAAKI; NISHIGAKI MASAKATSU(2006),
\A keylogger detection using dynamic API inspection". IPSJ SIG Technical
Reports, 209=214
[17] Baig, M.M. and Mahmood, W.(2007),\A robust technique of anti key-logging
using key-logging mechanism." Digital EcoSystems and Technologies Confer-
ence, 2007. DEST'07. Inaugural IEEE-IES,314-318
[18] Hong, J.I.(2005),\Minimizing security risks in ubicomp systems."
[19] SpyArsenal.com: Family Keylogger
http://www.spyarsenal.com/familykeylogger/
[20] Android Tools and documentation for developers
http://www.android.com/
全文公開日期 本全文未授權公開 (校內網路)