DYMO: Tracking Dynamic Code Identity

被引:0
|
作者
Gilbert, Bob [1 ]
Kemmerer, Richard [1 ]
Kruegel, Christopher [1 ]
Vigna, Giovanni [1 ]
机构
[1] Univ Calif Santa Barbara, Dept Comp Sci, Comp Secur Grp, Santa Barbara, CA 93106 USA
来源
关键词
code identity; process integrity; access control;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Code identity is a primitive that allows an entity to recognize a known, trusted application as it executes. This primitive supports trusted computing mechanisms such as sealed storage and remote attestation. Unfortunately, there is a generally acknowledged limitation in the implementation of current code identity mechanisms in that they are fundamentally static. That is, code identity is captured at program load-time and, thus, does not reflect the dynamic nature of executing code as it changes over the course of its run-time. As a result, when a running process is altered, for example, because of an exploit or through injected, malicious code, its identity is not updated to reflect this change. In this paper, we present DYMO, a system that provides a dynamic code identity primitive that tracks the run-time integrity of a process and can be used to detect code integrity attacks. To this end, a host-based component computes an identity label that reflects the executable memory regions of running applications (including dynamically generated code). These labels can be used by the operating system to enforce application-based access control policies. Moreover, to demonstrate a practical application of our approach, we implemented an extension to DYMO that labels network packets with information about the process that originated the traffic. Such provenance information is useful for distinguishing between legitimate and malicious activity at the network level.
引用
收藏
页码:21 / 40
页数:20
相关论文
共 50 条
  • [21] Evolution of the tracking code placet
    CERN, Geneva, Switzerland
    不详
    IPAC: Proc. Int. Part. Accel. Conf., (1014-1016):
  • [22] Tracking the Evolution of Code Clones
    Bakota, Tibor
    SOFSEM 2011: THEORY AND PRACTICE OF COMPUTER SCIENCE, 2011, 6543 : 86 - 98
  • [23] Multilingual identity The change of code as a symbol of identity in Chicano literature
    Jimenez Carra, Nieves
    TRANS-REVISTA DE TRADUCTOLOGIA, 2005, (09): : 229 - 231
  • [24] EPIGENETIC CODE AND SELF-IDENTITY
    Calvanese, Vincenzo
    Lara, Ester
    Fraga, Mario F.
    SELF AND NONSELF, 2012, 738 : 236 - 255
  • [25] Dynamic code assignment for OVSF code system
    Gong, D
    Yan, YS
    Lu, JH
    GLOBECOM '05: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6: DISCOVERY PAST AND FUTURE, 2005, : 2865 - 2869
  • [26] A Molecular Code for Identity in the Vomeronasal System
    Fu, Xiaoyan
    Yan, Yuetian
    Xu, Pei S.
    Geerlof-Vidavsky, Ilan
    Chong, Wongi
    Gross, Michael L.
    Holy, Timothy E.
    CELL, 2015, 163 (02) : 313 - 323
  • [27] Dynamic Source Routing Protocol -A Comparative analysis with AODV and DYMO in ZigBeebased Wireless Personal Area Network
    Alaparthi, SNarmada
    Parvataneni, Sudhakara Rao
    Vaishnavi, Ch. Seetha
    Sathvika, P.
    Chandrika, M.
    Sharanya, P.
    2019 6TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND INTEGRATED NETWORKS (SPIN), 2019, : 1042 - 1046
  • [28] Tracking the Philistines (Palestinian identity)
    Lewin, PA
    NEW YORK TIMES BOOK REVIEW, 2003, : 4 - 4
  • [29] Code Choice and Identity Construction on Stage
    Masterton, Simon
    VOICE AND SPEECH REVIEW, 2023, 17 (02) : 250 - 253
  • [30] Multimodal identity tracking in a smartroom
    Bernardin, Keni
    Ekenel, Hazim Kemal
    Stiefelhagen, Rainer
    ARTIFICIAL INTELLIGENCE APPLICATIONS AND INNOVATIONS, 2006, 204 : 324 - +