簡易檢索 / 詳目顯示

研究生: 鄭君浩
Jiun, Hao-Zheng
論文名稱: An Integrated System of Personal Computer and Mobile Device for Protecting Sensitive Information
一個保護私密檔案的個人電腦與行動裝置整合系統
指導教授: 孫宏民
Sun, Hung-Min
口試委員: 孫宏民
顏嵩銘
洪國寶
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 資訊工程學系
Computer Science
論文出版年: 2011
畢業學年度: 99
語文別: 英文
論文頁數: 39
中文關鍵詞: 資料安全Key logger
相關次數: 點閱:108下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 由於網路功能現今已經成為個人電腦必備的功能之一,根據國際電信聯盟(International Telecommunication Union, ITU) 於2011提出的一份統計資料顯示,目前全球網路的使用人口已經突破20億大關,使用者皆可輕易的在網路上下載取得需要的網路資源,只要使用者有使用網路的行為就有遭受Malicious Software攻擊的風險,讓潛伏在網路中的駭客(hacker)有機可趁,植入惡意程式,例如:木馬程式(Trojan horse)、鍵盤側錄程式(Keyboard logger)以及各種惡意間諜程式。這些惡意的攻擊極有可能藉此癱瘓或監控使用者的電腦,導致使用者重要的帳號及密碼資訊外洩,或是使得電腦中機密檔案被竊取的可能性大增。
    並且根據ITU的同一份調查資料,統計資料顯示出目前全球使用個人行動裝置(包含個人數位助理(PDA)、行動電話、平板電腦以及智慧型手機等等)。的用戶更是達到了50億的數字,與2000年相比成長的約五倍之多。由於個人行動裝置的處理功能性可比擬小型電腦以及擁有普及化的優點,在本篇論文中,提出一個基於機密資料保護的方法,防止重要檔案被惡意程式破壞以及降低被竊取的風險。


    1 Introduction . . . . . . . . . . . . . . . . . . . . . 1 2 Background . . . . . . . . . . . . . . . . . . . . . . 3 2.1 Kelogger . . . . . . . . . . . . . . . . . . . . . . . 3 2.2 Advanced Encryption Standard . . . . . . . . . . . . . 6 2.2.1 AES Introduction . . . . . . . . . . . . . . . . . . 6 2.2.2 Data Stucture of AES algorithm . . . . . . . . . . . 7 2.2.3 AES fowchart . . . . . . . . . . . . . . . . . . . 9 2.2.4 The four functions of AES . . . . . . . . . . . . . 12 3 Implementation . . . . . . . . . . . . . . . . . . . . 15 3.1 Client and Server Introduction . . . . . . . . . . . 15 3.2 Procedure of Server-side . . . . . . . . . . . . . . 21 3.3 Procedure of Client-side . . . . . . . . . . . . . . 23 3.4 Interaction between Client and Server . . . . . . . . 29 4 The system lowchart . . . . . . . . . . . . . . . . . 34 4.1 The Server fowchart . . . . . . . . . . . . . . . . . 34 4.2 The Client fowchart . . . . . .. . . . . . . . . . . 35 5 Conclusion . . . . . . . . . . . . . . . . . . . . . . 36 Reference . . . . . . . . . . . . . . . . . . . . . . . .37

    [1] Wang, X. and Yu, Q. (2009),\A block encryption algorithm based on dynamic
    sequences of multiple chaotic systems". Communications in Nonlinear Science
    and Numerical Simulation,574-581
    [2] Qiao, L. and Nahrstedt, K.(1998), \A new algorithm for MPEG video encryp-
    tion". Proceedings of The First International Conference on Imaging Science,
    Systems, and Technology
    [3] Rahman, S.M.M. and Hossain, M.A. and Mouftah, H. and El Saddik, A.
    and Okamoto, E. (2010), \A real-time privacy-sensitive data hiding approach
    based on chaos cryptography". Multimedia and Expo (ICME), 2010 IEEE
    International Conference on,72-77
    [4] Artz, D. (2001), \Digital steganography: hiding data within data". internet
    computing, IEEE,75-80
    [5] Independent Tests of Anti-Virus Software, Retrospective/Proactive Test
    http://www.av-comparatives.org/en/comparativesreviews/
    detection-test
    [6] International Telecommunication Union, StatShot News
    http://www.itu.int/net/pressoffice/stats/2011/01/index.aspx
    [7] Joan Daemen,Vincent Rijmen, \AES proposalRijndael.",1999, available at
    Web
    http://csrc.nist.gov/encryption/aes/rijndael/Rijndael.pdf
    [8] National Institute of Standards and Technology (NIST), CSRC Website
    http://csrc.nist.gov/archive/aes/index.html
    [9] National Institute of Standards and Technology (NIST), Commerce Secretary
    Announces New Standard for Global Information Security
    http://www.nist.gov/public_affairs/releases/g01-111.cfm
    [10] M. Xu, B. Salami, and C. Obimbo (2005), \How to Protect Personal Infor-
    mation against Keyloggers". Proceeding of Internet and Multimedia Systems,
    and Applications(IMSA05),275-280
    [11] Phishing Activity Trends, Monthly Report, Anti-Phishing Working Group,
    January 2008
    [12] Oliveira, S.R.M. and Za
    "ane, O.R.(2003), \Protecting sensitive knowledge by data sanitization",
    Data Mining, 2003. ICDM 2003. Third IEEE International Conference on,
    613-616
    [13] Doja, M.N.; Kumar, N. (2008),\Image Authentication Schemes against Key-
    Logger Spyware."
    [14] Muhammad Aslam, Rana Naveed Idrees, Mirza Muzammil Baig, and Muham-
    mad Asif Arshad(2004), \Anti-Hook Shield against the Software Key Log-
    gers."
    [15] Jun Fu; Yiwen Liang; Chengyu Tan; Xiaofei Xiong(2010), \Detecting Soft-
    ware Keyloggers with Dendritic Cell Algorithm". International Conference
    on Communications and Mobile Computing
    [16] TAKAMI TOMOHIRO; SUZUKI KOICHI; BABA TATSUYA; MAEDA
    SHUSUKE; MATSUMOTO TAKAAKI; NISHIGAKI MASAKATSU(2006),
    \A keylogger detection using dynamic API inspection". IPSJ SIG Technical
    Reports, 209=214
    [17] Baig, M.M. and Mahmood, W.(2007),\A robust technique of anti key-logging
    using key-logging mechanism." Digital EcoSystems and Technologies Confer-
    ence, 2007. DEST'07. Inaugural IEEE-IES,314-318
    [18] Hong, J.I.(2005),\Minimizing security risks in ubicomp systems."
    [19] SpyArsenal.com: Family Keylogger
    http://www.spyarsenal.com/familykeylogger/
    [20] Android Tools and documentation for developers
    http://www.android.com/

    無法下載圖示 全文公開日期 本全文未授權公開 (校內網路)
    全文公開日期 本全文未授權公開 (校外網路)
    全文公開日期 本全文未授權公開 (國家圖書館:臺灣博碩士論文系統)
    QR CODE