Practical proactive integrity preservation: A basis for malware defense

被引:10
|
作者
Sun, Weiqing [1 ]
Sekar, R. [1 ]
Poothia, Gaurav [1 ]
Karandikar, Tejas [1 ]
机构
[1] SUNY Stony Brook, Dept Comp Sci, Stony Brook, NY 11794 USA
关键词
D O I
10.1109/SP.2008.35
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Unlike today's reactive approaches, information flow based approaches can provide positive assurances about overall system integrity,. and hence can defend against sophisticated malware. However, there hasn't been much success in applying information flow based techniques to desktop systems running modern COTS operating systems. This is, in part, due to the fact that a strict application of information flow policy can break existing applications and OS services. Another important factor is the difficulty of policy development, which requires us to specify integrity labels for hundreds of thousands of objects on the system. This paper develops a new approach for proactive integrity protection that overcomes these challenges by decoupling integrity labels from access policies. We then develop an analysis that can largely automate the generation of integrity labels and policies that preserve the usability of applications in most cases. Evaluation of our prototype implementation on a Linux desktop distribution shows that it does not break or inconvenience the use of most applications, while stopping a variety of sophisticated malware attacks.
引用
收藏
页码:248 / 262
页数:15
相关论文
共 50 条
  • [1] Information Flow Containment: A Practical Basis for Malware Defense
    Sekar, R.
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXV, 2011, 6818 : 1 - 3
  • [2] Virus throttle as basis for ProActive Defense
    Sanchez, Mauricio
    Computer Network Security, Proceedings, 2007, 1 : 57 - 74
  • [3] Proactive Malware Detection
    Gloster, Jonathan
    Diep, Michael
    Dredden, David
    Mix, Matthew
    Olsen, Mark
    Price, Brian
    Steil, Betty
    CYBER SENSING 2014, 2014, 9097
  • [4] Malware Evasion Attack and Defense
    Huang, Yonghong
    Verma, Utkarsh
    Fralick, Celeste
    Infante-Lopez, Gabriel
    Kumar, Brajesh
    Woodward, Carl
    2019 49TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS WORKSHOPS (DSN-W), 2019, : 34 - 38
  • [5] CTO Roundtable: Malware Defense
    Creeger, Mache
    COMMUNICATIONS OF THE ACM, 2010, 53 (04) : 43 - 49
  • [6] A proactive approach to intrusion detection and malware collection
    Chen, Chia-Mei
    Cheng, Sheng-Tzong
    Zeng, Ruei-Yu
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (07) : 844 - 853
  • [7] ANXIETY, DEFENSE AND COGNITION - A THEORETICAL BASIS FOR PRACTICAL HANDLING OF SURGICAL PATIENT
    BLOCK, SL
    MEDICAL COLLEGE OF VIRGINIA QUARTERLY, 1969, 5 (03): : 135 - &
  • [8] Proactive Reputation-Based Defense for MANETs Using Radial Basis Function Neural Networks
    Imana, Eyosias Y.
    Ham, Fredric M.
    Allen, William
    Ford, Richard
    2010 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS IJCNN 2010, 2010,
  • [9] Botnets and proactive system defense
    Bambenek, John
    Klus, Agnes
    BOTNET DETECTION: COUNTERING THE LARGEST SECURITY THREAT, 2008, 36 : 117 - 130
  • [10] Proactive Malware Collection and Classification System: How to collect and classify useful malware samples?
    Tseng, Chinyang Henry
    Wang, Shiahuey
    Wang, Sheng-Chao
    Juang, Tong-Ying
    2014 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE, ELECTRONICS AND ELECTRICAL ENGINEERING (ISEEE), VOLS 1-3, 2014, : 1845 - 1848