According to experts, one third of all IT vulnerabilities today are due to inadequate software verification. Internal program processes are not sufficiently secured against manipulation by attackers, especially if access has been gained. There is a lack of internal control instances that can monitor and control program flows. Especially when a software vulnerability becomes known, quick action is required, whereby the consequences for an individual application are often not foreseeable. With our approach (B)LOCKBOX, software building blocks act as verified entities within a transaction-based blockchain network. Source Code, binaries and application execution become supervised. Unwanted interference and manipulation are prevented by the integrity of the distributed system.
翻译:据专家称,今天信息技术所有弱点的三分之一是由于软件核查不足造成的;内部程序没有得到充分的保障,防止攻击者的操纵,特别是如果已经获得接入;缺乏内部管制,无法监测和控制程序流动;特别是当发现软件的脆弱性时,需要迅速采取行动,这样个人应用的后果往往无法预见;由于我们的做法(B)LOCKBOX,软件构件在基于交易的连锁网络中作为核查的实体发挥作用;源码、二进制和应用程序执行受到监督;由于分布式系统的完整性而防止了不必要的干扰和操纵。