DYMO: Tracking Dynamic Code Identity

被引:0
|
作者
Gilbert, Bob [1 ]
Kemmerer, Richard [1 ]
Kruegel, Christopher [1 ]
Vigna, Giovanni [1 ]
机构
[1] Univ Calif Santa Barbara, Dept Comp Sci, Comp Secur Grp, Santa Barbara, CA 93106 USA
来源
关键词
code identity; process integrity; access control;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Code identity is a primitive that allows an entity to recognize a known, trusted application as it executes. This primitive supports trusted computing mechanisms such as sealed storage and remote attestation. Unfortunately, there is a generally acknowledged limitation in the implementation of current code identity mechanisms in that they are fundamentally static. That is, code identity is captured at program load-time and, thus, does not reflect the dynamic nature of executing code as it changes over the course of its run-time. As a result, when a running process is altered, for example, because of an exploit or through injected, malicious code, its identity is not updated to reflect this change. In this paper, we present DYMO, a system that provides a dynamic code identity primitive that tracks the run-time integrity of a process and can be used to detect code integrity attacks. To this end, a host-based component computes an identity label that reflects the executable memory regions of running applications (including dynamically generated code). These labels can be used by the operating system to enforce application-based access control policies. Moreover, to demonstrate a practical application of our approach, we implemented an extension to DYMO that labels network packets with information about the process that originated the traffic. Such provenance information is useful for distinguishing between legitimate and malicious activity at the network level.
引用
收藏
页码:21 / 40
页数:20
相关论文
共 50 条
  • [31] The Code for Facial Identity in the Primate Brain
    Chang, Le
    Tsao, Doris Y.
    CELL, 2017, 169 (06) : 1013 - +
  • [32] A CODE WITH DYNAMIC IMPACT
    DEMEIS, R
    AEROSPACE AMERICA, 1992, 30 (05) : 42 - 43
  • [33] Advancing Dynamic-Time Warp Techniques for Correcting Eye Tracking Data in Reading Source Code
    Al Madi, Naser
    JOURNAL OF EYE MOVEMENT RESEARCH, 2024, 17 (01): : 16 - 19
  • [34] TaintStream: Fine-Grained Taint Tracking for Big Data Platforms through Dynamic Code Translation
    Yang, Chengxu
    Li, Yuanchun
    Xu, Mengwei
    Chen, Zhenpeng
    Liu, Yunxin
    Huang, Gang
    Liu, Xuanzhe
    PROCEEDINGS OF THE 29TH ACM JOINT MEETING ON EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (ESEC/FSE '21), 2021, : 806 - 817
  • [35] Tracking code clones in evolving software
    Duala-Ekoko, Ekwa
    Robillard, Martin P.
    ICSE 2007: 29TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, PROCEEDINGS, 2007, : 158 - +
  • [36] Development of the Accsim tracking and simulation code
    Jones, FW
    PROCEEDINGS OF THE 1997 PARTICLE ACCELERATOR CONFERENCE, VOLS 1-3: PLENARY AND SPECIAL SESSIONS ACCELERATORS AND STORAGE RINGS - BEAM DYNAMICS, INSTRUMENTATION, AND CONTROLS, 1998, : 2597 - 2599
  • [37] GNSS Code Tracking in Presence of Data
    Sun, Kewen
    2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2011,
  • [38] Was there a 'code?': Methods for tracking CPR events
    Lin, R
    Roth, C
    Davis, L
    Roberts, K
    Cho, C
    PEDIATRIC RESEARCH, 2004, 55 (04) : 62A - 62A
  • [39] Evolution - Tracking the history of the genetic code
    Vogel, G
    SCIENCE, 1998, 281 (5375) : 329 - 331
  • [40] Enhanced Dynamic MANET On-demand(En-DYMO) Routing Protocol for Mobile Adhoc Networks
    Aravind, Maya C.
    Sangeetha, C. P.
    Suriyakala, C. D.
    2015 GLOBAL CONFERENCE ON COMMUNICATION TECHNOLOGIES (GCCT), 2015, : 532 - 537