DYMO: Tracking Dynamic Code Identity

被引:0
|
作者
Gilbert, Bob [1 ]
Kemmerer, Richard [1 ]
Kruegel, Christopher [1 ]
Vigna, Giovanni [1 ]
机构
[1] Univ Calif Santa Barbara, Dept Comp Sci, Comp Secur Grp, Santa Barbara, CA 93106 USA
来源
关键词
code identity; process integrity; access control;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Code identity is a primitive that allows an entity to recognize a known, trusted application as it executes. This primitive supports trusted computing mechanisms such as sealed storage and remote attestation. Unfortunately, there is a generally acknowledged limitation in the implementation of current code identity mechanisms in that they are fundamentally static. That is, code identity is captured at program load-time and, thus, does not reflect the dynamic nature of executing code as it changes over the course of its run-time. As a result, when a running process is altered, for example, because of an exploit or through injected, malicious code, its identity is not updated to reflect this change. In this paper, we present DYMO, a system that provides a dynamic code identity primitive that tracks the run-time integrity of a process and can be used to detect code integrity attacks. To this end, a host-based component computes an identity label that reflects the executable memory regions of running applications (including dynamically generated code). These labels can be used by the operating system to enforce application-based access control policies. Moreover, to demonstrate a practical application of our approach, we implemented an extension to DYMO that labels network packets with information about the process that originated the traffic. Such provenance information is useful for distinguishing between legitimate and malicious activity at the network level.
引用
收藏
页码:21 / 40
页数:20
相关论文
共 50 条
  • [41] Tracking Hackathon Code Creation and Reuse
    Imam, Ahmed
    Dey, Tapajit
    2021 IEEE/ACM 18TH INTERNATIONAL CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2021), 2021, : 615 - 617
  • [42] Codeless Code Tracking of BOC Signals
    O'Driscoll, Cillian
    Curran, James T.
    PROCEEDINGS OF THE 29TH INTERNATIONAL TECHNICAL MEETING OF THE SATELLITE DIVISION OF THE INSTITUTE OF NAVIGATION (ION GNSS+ 2016), 2016, : 497 - 508
  • [43] Joint Satellite Code and Carrier Tracking
    Giger, Kaspar
    Henkel, Patrick
    Guenther, Christoph
    PROCEEDINGS OF THE 2010 INTERNATIONAL TECHNICAL MEETING OF THE INSTITUTE OF NAVIGATION - ITM 2010, 2010, : 636 - 645
  • [44] Exploring code portability solutions for HEP with a particle tracking test code
    Ather, Hammad
    Berkman, Sophie
    Cerati, Giuseppe
    Kortelainen, Matti J.
    Kwok, Ka Hei Martin
    Lantz, Steven
    Lee, Seyong
    Norris, Boyana
    Reid, Michael
    Hall, Allison Reinsvold
    Riley, Daniel
    Strelchenko, Alexei
    Wang, Cong
    FRONTIERS IN BIG DATA, 2024, 7
  • [45] Fine-grained Code Changes Tracking Approach for Code Review
    Wang M.
    Pan X.-L.
    Zou Y.-Z.
    Xie B.
    Ruan Jian Xue Bao/Journal of Software, 2023, 34 (10): : 4705 - 4723
  • [46] Brain Activation of Identity Switching in Multiple Identity Tracking Task
    Lyu, Chuang
    Hu, Siyuan
    Wei, Liuqing
    Zhang, Xuemin
    Talhelm, Thomas
    PLOS ONE, 2015, 10 (12):
  • [47] Dynamic Code Whitelist for Efficient Analysis of Android Code
    Choi, Jeongwoo
    Kim, Yongmin
    Lee, Jinwoo
    Hong, Jiman
    PROCEEDINGS OF THE 2018 CONFERENCE ON RESEARCH IN ADAPTIVE AND CONVERGENT SYSTEMS (RACS 2018), 2018, : 165 - 166
  • [48] Identity or Dynamic Structure?
    Gallagher, Shaun
    CONSTRUCTIVIST FOUNDATIONS, 2016, 11 (02): : 363 - 364
  • [49] Identity of Dynamic Meanings
    Arazim, Pavel
    CROATIAN JOURNAL OF PHILOSOPHY, 2022, 22 (64) : 69 - 90
  • [50] Commentary: The Code for Facial Identity in the Primate Brain
    Rossion, Bruno
    Taubert, Jessica
    FRONTIERS IN HUMAN NEUROSCIENCE, 2017, 11