28-11-2012, 02:53 PM
A New Approach to Theftware-Efficient Solution
A New Approach to Theftware-Efficient Solution.pdf (Size: 110.5 KB / Downloads: 39)
Abstract
Theftware is software cum a proposed firmware which helps to track down a laptop in case of theft. Now a
days, cases of laptop theft are becoming too frequent and prominent as it’s a pretty easy as well as
rewarding affair for the burglars. Especially in the second and third world countries, where the hitherto
technologies are not up to the international standards i.e. there is a big lacunae between the western
countries and the developing countries in terms of technological infrastructure. In such places to prevent,
stop, and track down of such cases of nuisance, we propose a model named Theftware which is a sinequa-
non as it’s being developed with an eye that it’s for the masses and not for the few selected. We also
purpose a central server with a database of all the registered laptop users in the world which will be
under the control of a government regulatory authority or it may be an autonomous one, depending on the
requirements, need and power required to be vested in them. All the companies i.e. laptop manufacturers
or service providers needs to enter all the details of their customers along with the information of laptop
sold to them. The registered users in case of theft will report to this regulatory authority that will verify
the request and report to the server if required. The work of Theftware starts from here as it periodically
checks the central database to verify that the laptop has been stolen or not. If the laptop is found under
scrutiny it will report to the server with the detailed information of its present location, so that it can be
tracked by the regulating authority. In this paper we have proposed how an ordinary laptop can be vested
with a Theftware process and how this process collects the system details along with the process of
communication with the remote server. In this paper we have also discussed the scheduling algorithm for
the Theftware which is a sine-qua-non for the laptop’s efficient performance along with the algorithm for
the various processes inside Theftware. We have also prepared a comparative study which shows the
laptops performance degradation on vesting with this software.
Introduction
According to the FBI, losses due to the laptop theft have been found more than $3.5 million
dollars in 2005. The Computer Security Institute/FBI Computer Crime & Security Survey found
the average theft of a laptop to cost a company $31,975.[13] The incidence of laptop theft has
been growing along with the phenomenal use of the laptop. Around 2 laptops in every 10 laptops
are stolen every day,[1] even having various sorts of expertise in tracking down these stolen
devices at additional cost.
In a country like India which is arguably considered one of the largest market for electronic
devices like laptops and mobiles. Their thefts are very serious and important issue to handle as an
average citizen can’t afford multiple laptops in case of one being stolen unlike their western
counterpart nor they can spend that much money on buying expensive tracking mechanisms like
Alerta Laptop[9] and Absolute software[7] which is not only expensive but presently not
available in developing countries. Moreover the importance of data is increasing day by day and
has already become more important than the laptop itself. Hence a mechanism of tracking stolen
laptop so as to increase security has become a necessity. Further, this problem needs social views
also and some sort of different mechanism is a must requirement which may deter future laptop
theft. Theftware is an effort in this direction which fulfills both the concept of tracking as well as
delimiting the laptop theft. Thefware is an effective as well as a viable option for the ordinary
naïve users. Theftware can work as a deterrent for future reference and prove itself as an
appropriate mechanism for theft cases.
2. Proposed Model
We propose a central server with a database of all the registered stolen laptop users in the world
which will be under the control of a government regulatory authority or it may be an
autonomous one, depending on the requirements, need and power required to be vested in them.
All the victims of laptop theft will have to lodge a FIR to the local police station; the mechanism
will be such that the FIR report along with all details of the laptop will be send by the police to
the regulatory body, which will activate Theftware present in the stolen laptop registered in the
central database.
The work of Theftware starts from here as it periodically checks the central database to verify
that the laptop is under surveillance or not, If found under scrutiny it will report to the server
with the detailed information of its whereabouts, so that it can be tracked by the destined
authority.
3. Related Work
Intel’s Antitheft Technology
Intel AT includes several hardware-based detection mechanisms that can trigger a lock down.
Detection mechanisms can be local (based on IT policy) or remote (via LAN[22], WLAN, or
3G[3]connectivity).Two Hardware-based detection and trigger mechanisms (all configurable by
flexible IT policies) include:
a. Excessive login attempts in the pre-boot authentication (PBA) screen.
b. Missed check-ins with the central server.
Advanced Computing: An International Journal ( ACIJ ), Vol.3, No.4, July 2012
89
c. Notification via a message sent over an IP-based wired or wireless LAN.
d. Notification via an encrypted SMS text message over a 3G [4][5] network.
In the above case except case (d) the system goes in theft mode and starts an automatic hardware
lockdown even if the system is booted or boot order is changed, and in the case of option (d)
whenever it is in the 3G network range[10][19][20] it send a message to its server consisting of
its GPS coordinates.
ASUS Anti-Theft
ASUS Anti-Theft[24] protection keeps confidential data safe and secure. It contains 3 level of
protection to keep the highest safety for our laptops.
1) LOCATES AND TRACKS the stolen laptops- It’s even possible to track and recover a laptop
after it’s been stolen, with the help of Comp trace LoJack software inside.
2) REMOTELY LOCK YOUR STOLEN LAPTOPS-Still, should all else fail, ASUS Anti-theft
solution integrated with the Intel Anti-theft technology in chipset, so user can remotely lock the
system and/or delete the data on the stolen computer, so there is never any risk of sensitive data
ever being seen by the unauthorized people.
3) ANTI-THEFT SOLUTION always working even when the software is removed from the
hardest - What guarantees the system works, is the fact that the Persistent Embedded BIOS
Agent will always function, even if the hard disk is wiped or replaced, so there’s no way to
circumvent the protection. ASUS’ Anti-Theft solution is built to always keep your data
protected.
Drawbacks Of Related Work
The Intel Antitheft Technology works on concept of hardware lockdown by use of internal
embedded hardware but in this case the laptop is merely can’t be used but its tracking is not
possible. In case of Intel Antitheft tracking is possible only when it is in the 3G
network[6][8][18] range, which is not possible in case of developing countries like India as 3G
network is not widely used, moreover the thief also knowing this will never expose his laptop to
3G network, moreover it works only on Intel’s hard disk not on other manufacturer’s hard disc
and lastly the customer has to buy this mechanism and has to incur its yearly cost even if his/her
laptop doesn’t get stolen which is a overhead for middle class people.