File Download
  • No File Attached
 
Links for fulltext
(May Require Subscription)
 
Supplementary

Conference Paper: An analysis of the Green Dam Youth Escort software
  • Basic View
  • Metadata View
  • XML View
TitleAn analysis of the Green Dam Youth Escort software
 
AuthorsLi, F1
Chan, H1
Chow, KP1
Lai, P1
 
KeywordsAnalysis
Forensic Perspective
Green Dam Youth Escort
 
Issue Date2010
 
CitationIfip Advances In Information And Communication Technology, 2010, v. 337 AICT, p. 49-62 [How to Cite?]
DOI: http://dx.doi.org/10.1007/978-3-642-15506-2_4
 
AbstractAccording to official Chinese media sources, the Green Dam Youth Escort (GDYE) software is intended to protect young citizens from viewing unhealthy information on the Internet. However, critics maintain that GDYE has serious security vulnerabilities that allow hackers to take control of computers installed with GDYE. Critics also claim that the software is designed to collect user data and keystrokes for transmission to remote servers for unknown purposes. GDYE was originally mandated to be pre-installed on every computer sold in the People's Republic of China. However, the plan was suddenly shelved in the face of intense international media attention. This paper evaluates the GDYE software's advertised functions and additional non-advertised capabilities. As the software may have spyware and malware functionality, the evaluation monitored the software behavior in a specialized controlled environment. The analysis was performed from a forensics perspective to collect digital evidence and traces in order to prove or disprove that GDYE captures and disseminates private information. © 2010 International Federation for Information Processing.
 
ISSN1868-4238
2013 SCImago Journal Rankings: 0.186
 
DOIhttp://dx.doi.org/10.1007/978-3-642-15506-2_4
 
ReferencesReferences in Scopus
 
DC FieldValue
dc.contributor.authorLi, F
 
dc.contributor.authorChan, H
 
dc.contributor.authorChow, KP
 
dc.contributor.authorLai, P
 
dc.date.accessioned2012-06-26T06:32:04Z
 
dc.date.available2012-06-26T06:32:04Z
 
dc.date.issued2010
 
dc.description.abstractAccording to official Chinese media sources, the Green Dam Youth Escort (GDYE) software is intended to protect young citizens from viewing unhealthy information on the Internet. However, critics maintain that GDYE has serious security vulnerabilities that allow hackers to take control of computers installed with GDYE. Critics also claim that the software is designed to collect user data and keystrokes for transmission to remote servers for unknown purposes. GDYE was originally mandated to be pre-installed on every computer sold in the People's Republic of China. However, the plan was suddenly shelved in the face of intense international media attention. This paper evaluates the GDYE software's advertised functions and additional non-advertised capabilities. As the software may have spyware and malware functionality, the evaluation monitored the software behavior in a specialized controlled environment. The analysis was performed from a forensics perspective to collect digital evidence and traces in order to prove or disprove that GDYE captures and disseminates private information. © 2010 International Federation for Information Processing.
 
dc.description.naturelink_to_subscribed_fulltext
 
dc.identifier.citationIfip Advances In Information And Communication Technology, 2010, v. 337 AICT, p. 49-62 [How to Cite?]
DOI: http://dx.doi.org/10.1007/978-3-642-15506-2_4
 
dc.identifier.doihttp://dx.doi.org/10.1007/978-3-642-15506-2_4
 
dc.identifier.epage62
 
dc.identifier.issn1868-4238
2013 SCImago Journal Rankings: 0.186
 
dc.identifier.scopuseid_2-s2.0-78651094438
 
dc.identifier.spage49
 
dc.identifier.urihttp://hdl.handle.net/10722/151985
 
dc.identifier.volume337 AICT
 
dc.languageeng
 
dc.relation.ispartofIFIP Advances in Information and Communication Technology
 
dc.relation.referencesReferences in Scopus
 
dc.subjectAnalysis
 
dc.subjectForensic Perspective
 
dc.subjectGreen Dam Youth Escort
 
dc.titleAn analysis of the Green Dam Youth Escort software
 
dc.typeConference_Paper
 
<?xml encoding="utf-8" version="1.0"?>
<item><contributor.author>Li, F</contributor.author>
<contributor.author>Chan, H</contributor.author>
<contributor.author>Chow, KP</contributor.author>
<contributor.author>Lai, P</contributor.author>
<date.accessioned>2012-06-26T06:32:04Z</date.accessioned>
<date.available>2012-06-26T06:32:04Z</date.available>
<date.issued>2010</date.issued>
<identifier.citation>Ifip Advances In Information And Communication Technology, 2010, v. 337 AICT, p. 49-62</identifier.citation>
<identifier.issn>1868-4238</identifier.issn>
<identifier.uri>http://hdl.handle.net/10722/151985</identifier.uri>
<description.abstract>According to official Chinese media sources, the Green Dam Youth Escort (GDYE) software is intended to protect young citizens from viewing unhealthy information on the Internet. However, critics maintain that GDYE has serious security vulnerabilities that allow hackers to take control of computers installed with GDYE. Critics also claim that the software is designed to collect user data and keystrokes for transmission to remote servers for unknown purposes. GDYE was originally mandated to be pre-installed on every computer sold in the People&apos;s Republic of China. However, the plan was suddenly shelved in the face of intense international media attention. This paper evaluates the GDYE software&apos;s advertised functions and additional non-advertised capabilities. As the software may have spyware and malware functionality, the evaluation monitored the software behavior in a specialized controlled environment. The analysis was performed from a forensics perspective to collect digital evidence and traces in order to prove or disprove that GDYE captures and disseminates private information. &#169; 2010 International Federation for Information Processing.</description.abstract>
<language>eng</language>
<relation.ispartof>IFIP Advances in Information and Communication Technology</relation.ispartof>
<subject>Analysis</subject>
<subject>Forensic Perspective</subject>
<subject>Green Dam Youth Escort</subject>
<title>An analysis of the Green Dam Youth Escort software</title>
<type>Conference_Paper</type>
<description.nature>link_to_subscribed_fulltext</description.nature>
<identifier.doi>10.1007/978-3-642-15506-2_4</identifier.doi>
<identifier.scopus>eid_2-s2.0-78651094438</identifier.scopus>
<relation.references>http://www.scopus.com/mlt/select.url?eid=2-s2.0-78651094438&amp;selection=ref&amp;src=s&amp;origin=recordpage</relation.references>
<identifier.volume>337 AICT</identifier.volume>
<identifier.spage>49</identifier.spage>
<identifier.epage>62</identifier.epage>
</item>
Author Affiliations
  1. The University of Hong Kong