- Home
- Search Results
- Page 1 of 1
Search for: All records
-
Total Resources4
- Resource Type
-
0003000001000000
- More
- Availability
-
13
- Author / Contributor
- Filter by Author / Creator
-
-
Fu, Xinwen (2)
-
Ling, Zhen (2)
-
Luo, Lan (2)
-
Yang, Ming (2)
-
Alyami, Mnassar (1)
-
Amoruso, Edward L (1)
-
Dong, Kai (1)
-
Jiang, Ping (1)
-
Lei, Chongqing (1)
-
Leinecker, Richard (1)
-
Li, Haobo (1)
-
Liu, Kaizheng (1)
-
Luo, Junzhou (1)
-
Shao, Xinhui (1)
-
Solihin, Yan (1)
-
Yan, Huaiyu (1)
-
Zhang, Yuan (1)
-
Zou, Cliff (1)
-
Zou, Cliff C (1)
-
#Tyler Phillips, Kenneth E. (0)
-
- Filter by Editor
-
-
& Spizer, S. M. (0)
-
& . Spizer, S. (0)
-
& Ahn, J. (0)
-
& Bateiha, S. (0)
-
& Bosch, N. (0)
-
& Brennan K. (0)
-
& Brennan, K. (0)
-
& Chen, B. (0)
-
& Chen, Bodong (0)
-
& Drown, S. (0)
-
& Ferretti, F. (0)
-
& Higgins, A. (0)
-
& J. Peters (0)
-
& Kali, Y. (0)
-
& Ruiz-Arias, P.M. (0)
-
& S. Spitzer (0)
-
& Sahin. I. (0)
-
& Spitzer, S. (0)
-
& Spitzer, S.M. (0)
-
(submitted - in Review for IEEE ICASSP-2024) (0)
-
-
Have feedback or suggestions for a way to improve these results?
!
Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher.
Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?
Some links on this page may take you to non-federal websites. Their policies may differ from this site.
-
The Windows registry contains a plethora of information in a hierarchical database. It includes system-wide settings, user preferences, installed programs, and recently accessed files and maintains timestamps that can be used to construct a detailed timeline of user activities. However, these data are unencrypted and thus vulnerable to exploitation by malicious actors who gain access to this repository. To address this security and privacy concern, we propose a novel approach that efficiently encrypts and decrypts sensitive registry data in real time. Our developed proof-of-concept program intercepts interactions between the registry’s application programming interfaces (APIs) and other Windows applications using an advanced hooking technique. This enables the proposed system to be transparent to users without requiring any changes to the operating system or installed software. Our approach also implements the data protection API (DPAPI) developed by Microsoft to securely manage each user’s encryption key. Ultimately, our research provides an enhanced security and privacy framework for the Windows registry, effectively fortifying the registry against security and privacy threats while maintaining its accessibility to legitimate users and applications.more » « lessFree, publicly-accessible full text available August 1, 2025
-
Alyami, Mnassar; Zou, Cliff; Solihin, Yan (, IEEE International Conference on Smart Applications, Communications and Networking (SmartNets))Free, publicly-accessible full text available May 28, 2025
-
Liu, Kaizheng; Yang, Ming; Ling, Zhen; Zhang, Yuan; Lei, Chongqing; Luo, Lan; Fu, Xinwen (, IEEE INFOCOM)Free, publicly-accessible full text available May 20, 2025
-
Yan, Huaiyu; Ling, Zhen; Li, Haobo; Luo, Lan; Shao, Xinhui; Dong, Kai; Jiang, Ping; Yang, Ming; Luo, Junzhou; Fu, Xinwen (, Internet Society NDSS)