IBM studies new computer security technology
Scientists at IBM's Almaden Labs have just developed a new technology that can prevent computer viruses and worms without any antivirus software.
This is an invention by scientist Amit Singh, who has been researching techniques to simplify personal computers for many years. Two years ago, Mr. Singh discovered that computers were becoming more and more overwhelmed by security and management software, and with his colleagues Anurag Sharma and Steve Welch, he developed parts. Soft makes computer use easier.
His research team conducted a research project called Securing Enforcement Environment (AX), using a method of strictly controlling what is running on the computer.
With a technique invented by IBM, AX will load the " AXE runtime ", a special software into the central part of the operating system, or core, whenever the computer is started. The software then monitors every part of the software that works on the computer and makes sure that only authorized code can run.
Unlike antivirus software, AX does not perform this control by monitoring dangerous software. It only prevents any code from being executed unless the code has been preconfigured in a special format compatible with AX, a process that IBM scientists say writers Viruses and spyware cannot be done.
" We are making the operating system on each computer unique, " Singh said. He added that AX currently can work with the core of both Windows and Mac operating systems.
Users or administrators can use a variety of techniques, including encryption to ensure that unauthorized software will not be able to run without their approval. They can also use AX to ensure that certain programs will only be able to run on certain computers, or even use AX techniques to protect and prevent others from reading the data. prevent theft of documents on the computer.
AX developers said that because some users may not want every software they run on the computer to be monitored by an IT administrator, they have added some flexible features. into software design. Computers will be able to be configured to allow anonymous software to work, but only if approved by the user, or users can set up to run anonymous software in a computer environment. virtual to reduce the risk for the operating system.
According to analyst Andrew Jaquith of Yankee Group, the idea of creating a " whitelist " of licensed software is increasingly being used by security vendors, by traditional anti-virus techniques by Preventing the identified destructive software has become increasingly cumbersome. He said: " The white list may be the method of the future ." He said other vendors, such as SecureWave and Bit9, also used a similar security method.
However, the downside of whitelists is that they can create complexity in management because network administrators will have to intervene when any software is upgraded. " If Microsoft sends a fix, users may have to re-register the upgraded applications. The problem here is not whether the technology is working or not, but whether it is available," he said. can manage it or not ".
IBM estimates that next year, when it has gained better knowledge about AX management, they will provide this software for some customers to try.
Follow ND / PCWORLD
- Computer spontaneously explodes when hacked
- Hardening of security functions
- Internal troubles are more worrisome than computer viruses
- 6 applications that change the world of quantum computer technology
- Bank security is still loose
- Use Kaspersky security software, effective anti-virus
- See network security struggles like the front
- Google is about to come out with a laptop
- Ten current security trends
- Forget your Face ID or iris, and we're about to unlock the phone with sweat
- Computer rolls like paper
- 8 technology-related obsessions of the decade