scispace - formally typeset
Search or ask a question
Topic

Data Protection API

About: Data Protection API is a research topic. Over the lifetime, 28 publications have been published within this topic receiving 752 citations.

Papers
More filters
Patent
06 Jan 1999
TL;DR: A data protection system that integrates a database with Windows Explorer in the Microsoft Windows 9X and NT Environments that mimics the Windows Explorer user interface, enabling the user to apply already known use paradigms is presented in this article.
Abstract: A data protection system that integrates a database with Windows Explorer in the Microsoft Windows 9X and NT Environments that mimics the Windows Explorer user interface, enabling the user to apply already known use paradigms. The data protection system appears as an extension to Windows Explorer and visibly appears as a folder item called the data vault. The data vault is a virtual disk that represents the underlying database. The database creates records and stores information about files backed up to removable secondary storage medium. Files may be backed up manually or automatically. A schedule can be set up for automatic protection of selected files and file types. The database can be searched to find files for restoration purposes without having to load secondary storage medium. Once a file or files are selected, the data protection system indicates which labeled removable secondary storage medium must be loaded for retrieval.

602 citations

Journal ArticleDOI
TL;DR: A novel countermeasure against cryptoviral extortion attacks is shown that forces the API caller to demonstrate that an authorized party can recover the asymmetrically encrypted data.
Abstract: This paper presents the experimental results that were obtained by implementing the payload of a cryptovirus on the Microsoft Windows platform. The attack is based entirely on the Microsoft Cryptographic API and the needed API calls are covered in detail. More specifically, it is shown that by using eight types of API calls and 72 lines of C code, the payload can hybrid encrypt sensitive data and hold it hostage. Benchmarks are also given. A novel countermeasure against cryptoviral extortion attacks is shown that forces the API caller to demonstrate that an authorized party can recover the asymmetrically encrypted data.

33 citations

Book
01 Sep 1992
TL;DR: This foundation guide to Windows programming covers the enhancements of Windows 3.1.1, including the new Dynamic Data Exchange (DDE) protocol, the printing and TrueType font application programming interface (API) and more.
Abstract: This foundation guide to Windows programming covers the enhancements of Windows 3.1. These include the new Dynamic Data Exchange (DDE) protocol, the printing and TrueType font application programming interface (API) and more. As useful to owners of the current edition as the new Windows programmers, this book is packed with explanations, insights, tried and tested programming techniques and scores of sample programs written in C.

30 citations

Book
01 Jul 1999
TL;DR: Drawing on his extensive experience supporting Microsoft Internet Explorer customers, the author leads you skillfully through common programming challenges - helping to develop dynamic, easy-to-use applications with simpler code and less production time.
Abstract: From the Publisher: With Programming Microsoft Internet Explorer 5, you can build and deploy applications faster, cheaper, and with broader reach than with any other platform. Whether you're simply adding help to a Web page or developing a full-featured Windows application, you'll find the detailed guidance and practical code samples you need to get productive quickly." "Drawing on his extensive experience supporting Microsoft Internet Explorer customers, the author leads you skillfully through common programming challenges - helping you develop dynamic, easy-to-use applications with simpler code and less production time.

18 citations

Book ChapterDOI
20 Sep 2005
TL;DR: It is shown that by using 8 types of API calls and 72 lines of ANSI C code, the payload can hybrid encrypt sensitive data and hold it hostage on the host computer system.
Abstract: This paper presents the experimental results that were obtained by implementing the payload of a cryptovirus on the Microsoft Windows platform. A novel countermeasure against cryptoviral extortion is presented that forces the API caller to demonstrate that an authorized party can recover the asymmetrically encrypted data. The attack is based entirely on the Microsoft Cryptographic API and the needed API calls are covered in detail. The exact sequence of API calls that is used for both the viral payload and the code for key generation, decryption, and so on is given. More specifically, it is shown that by using 8 types of API calls and 72 lines of ANSI C code, the payload can hybrid encrypt sensitive data and hold it hostage on the host computer system. These findings demonstrate the ease with which one can apply cryptography to devise the payload of a cryptovirus when a cryptographic API is readily available on host machines.

14 citations

Network Information
Related Topics (5)
Firewall (construction)
6.1K papers, 79.4K citations
71% related
Client–server model
9.2K papers, 219.2K citations
71% related
Web design
12.1K papers, 271.5K citations
71% related
Security information and event management
14.1K papers, 254.1K citations
70% related
Information security standards
2.9K papers, 62.7K citations
70% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20181
20171
20161
20142
20131
20124