{"id":597,"date":"2020-07-20T22:24:08","date_gmt":"2020-07-20T20:24:08","guid":{"rendered":"http:\/\/wp.unil.ch\/persuasivelab\/?p=597"},"modified":"2021-01-03T19:46:07","modified_gmt":"2021-01-03T18:46:07","slug":"project-checksum","status":"publish","type":"post","link":"https:\/\/wp.unil.ch\/persuasivelab\/2020\/07\/project-checksum\/","title":{"rendered":"Project Checksum"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-493 alignright\" src=\"https:\/\/wp.unil.ch\/persuasivelab\/files\/2020\/05\/checksum-300x210.png\" alt=\"checksum string in a web page\" width=\"300\" height=\"210\" srcset=\"https:\/\/wp.unil.ch\/persuasivelab\/files\/2020\/05\/checksum-300x210.png 300w, https:\/\/wp.unil.ch\/persuasivelab\/files\/2020\/05\/checksum-334x233.png 334w, https:\/\/wp.unil.ch\/persuasivelab\/files\/2020\/05\/checksum-314x220.png 314w, https:\/\/wp.unil.ch\/persuasivelab\/files\/2020\/05\/checksum.png 709w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>In often cases software companies or independent developers distribute the binary files of their software using sources different than the original website. This creates a risk of making the original binaries corrupted, making the computer used to download them corrupt.<\/p>\n<p>For instance, versions of popular programs (e.g., BitTorrent clients) corrupted and disseminated by hackers include malware that turns the victims\u2019 computer into so-called bots, injects spyware and ads or even mine Bitcoins, thus generating profit for the hackers.<\/p>\n<p>Trying to reduce this risk, developers use a cryptographic check-sum or hash, corresponding to the binary file of their program. The functions used to generate such check-sums are built in a way that it is not tractable to generate another file with the exact same check-sum. Therefore, if the binary file of a program is corrupted, the corresponding hash will be different from that of the original file, thus allowing the users who download it to detect the corruption and cancel its installation.<\/p>\n<p><strong>Project Leader:<\/strong> K\u00e9vin Huguenin.<\/p>\n<p><strong>UNIL collaborators:<\/strong> Bertil Chapuis.<\/p>\n<p><strong>External collaborators:<\/strong> Alexandre Meylan (Kudelski Security), Mathias Humbert (Armasuisse), Igor Bilogrevic (Google).<\/p>\n<p><strong>Publications<\/strong><\/p>\n<ul>\n<li>A. Meylan, M. Cherubini, B. Chapuis, M. Humbert, I. Bilogrevic, and K. Huguenin. 2020. A Study on the Use of Checksums for Integrity Verification of Web Downloads. <em>ACM Transasctions on Privacy and Security<\/em> (TOPS), 24, 1, Article 4 (September 2020), 36 pages. DOI: <a href=\"https:\/\/doi.org\/10.1145\/3410154\">10.1145\/3410154<\/a><\/li>\n<li>B. Chapuis, O. Omolola, M. Cherubini, M. Humbert, K. Huguenin. An Empirical Study of the Use of Integrity Verification Mechanisms for Web Subresources. In Proc. of the The Web Conference (WWW\u201920), Taipei, Taiwan, Apr 2020. DOI:<a href=\"https:\/\/dx.doi.org\/10.1145\/3366423.3380092\">10.1145\/3366423.3380092<\/a><\/li>\n<li>M. Cherubini, A. Meylan, B. Chapuis, M. Humbert, I. Bilogrevic, K. Huguenin (2018). Towards Usable Checksums: Automating the Integrity Verification of Web Downloads for the Masses. In Proc. of the 25th ACM Conference on Computer and Communications Security (CCS\u201918), Toronto, ON, Canada, Oct 2018. DOI:\u00a0<a href=\"https:\/\/dx.doi.org\/10.1145\/3243734.3243746\">10.1145\/3243734.3243746<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>In often cases software companies or independent developers distribute the binary files of their software using sources different than the original website. This creates a risk of making the original &hellip; <\/p>\n","protected":false},"author":1002070,"featured_media":493,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","footnotes":""},"categories":[5],"tags":[],"class_list":{"0":"post-597","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-research-finished"},"_links":{"self":[{"href":"https:\/\/wp.unil.ch\/persuasivelab\/wp-json\/wp\/v2\/posts\/597","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wp.unil.ch\/persuasivelab\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wp.unil.ch\/persuasivelab\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wp.unil.ch\/persuasivelab\/wp-json\/wp\/v2\/users\/1002070"}],"replies":[{"embeddable":true,"href":"https:\/\/wp.unil.ch\/persuasivelab\/wp-json\/wp\/v2\/comments?post=597"}],"version-history":[{"count":0,"href":"https:\/\/wp.unil.ch\/persuasivelab\/wp-json\/wp\/v2\/posts\/597\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wp.unil.ch\/persuasivelab\/wp-json\/wp\/v2\/media\/493"}],"wp:attachment":[{"href":"https:\/\/wp.unil.ch\/persuasivelab\/wp-json\/wp\/v2\/media?parent=597"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wp.unil.ch\/persuasivelab\/wp-json\/wp\/v2\/categories?post=597"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wp.unil.ch\/persuasivelab\/wp-json\/wp\/v2\/tags?post=597"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}