Practical proactive integrity preservation: A basis for malware defense

被引:10
|
作者
Sun, Weiqing [1 ]
Sekar, R. [1 ]
Poothia, Gaurav [1 ]
Karandikar, Tejas [1 ]
机构
[1] SUNY Stony Brook, Dept Comp Sci, Stony Brook, NY 11794 USA
关键词
D O I
10.1109/SP.2008.35
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Unlike today's reactive approaches, information flow based approaches can provide positive assurances about overall system integrity,. and hence can defend against sophisticated malware. However, there hasn't been much success in applying information flow based techniques to desktop systems running modern COTS operating systems. This is, in part, due to the fact that a strict application of information flow policy can break existing applications and OS services. Another important factor is the difficulty of policy development, which requires us to specify integrity labels for hundreds of thousands of objects on the system. This paper develops a new approach for proactive integrity protection that overcomes these challenges by decoupling integrity labels from access policies. We then develop an analysis that can largely automate the generation of integrity labels and policies that preserve the usability of applications in most cases. Evaluation of our prototype implementation on a Linux desktop distribution shows that it does not break or inconvenience the use of most applications, while stopping a variety of sophisticated malware attacks.
引用
收藏
页码:248 / 262
页数:15
相关论文
共 50 条
  • [21] Malware defense using network security authentication
    Antrosio, JV
    Fulp, EW
    THIRD IEEE INTERNATIONAL WORKSHOP ON INFORMATION ASSURANCE, PROCEEDINGS, 2005, : 43 - 54
  • [22] A PRoactive malware identification system based on the computer hygiene principles
    Vlachos, Vasileios
    Spinellis, Diomidis
    Information Management and Computer Security, 2007, 15 (04): : 295 - 312
  • [23] A defense framework against malware and vulnerability exploits
    Meng Zhang
    Anand Raghunathan
    Niraj K. Jha
    International Journal of Information Security, 2014, 13 : 439 - 452
  • [24] Towards a Practical Defense Against Adversarial Attacks on Deep Learning-Based Malware Detectors via Randomized Smoothing
    Gibert, Daniel
    Zizzo, Giulio
    Le, Quan
    COMPUTER SECURITY. ESORICS 2023 INTERNATIONAL WORKSHOPS, CPS4CIP, PT II, 2024, 14399 : 683 - 699
  • [25] GLUTAMINE AND THE PRESERVATION OF GUT INTEGRITY
    VANDERHULST, RRWJ
    VANKREEL, BK
    VONMEYENFELDT, MF
    BRUMMER, RJM
    ARENDS, JW
    DEUTZ, NEP
    SOETERS, PB
    LANCET, 1993, 341 (8857): : 1363 - 1365
  • [26] Proactive Defense for Internet-of-things: Moving Target Defense With Cyberdeception
    Ge, Mengmeng
    Cho, Jin-Hee
    Kim, Dongseong
    Dixit, Gaurav
    Chen, Ing-Ray
    ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2022, 22 (01)
  • [27] Preservation of the integrity of electronic records
    Shepherd, E
    JOURNAL OF LIBRARIANSHIP AND INFORMATION SCIENCE, 2003, 35 (03) : 204 - 205
  • [28] Cloning and the preservation of family integrity
    Orentlicher, D
    LOUISIANA LAW REVIEW, 1999, 59 (04): : 1019 - 1040
  • [29] Preservation of Integrity Constraints by Workflow
    Liu, Xi
    Su, Jianwen
    Yang, Jian
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2011, PT I, 2011, 7044 : 64 - +
  • [30] Integrity and Confidentiality Preservation in Cloud
    Singh, Kirti Dhwaj
    Sharma, Ayushi
    Singh, Shivali
    Singh, Vikram
    Rane, Sagar
    2017 INTERNATIONAL CONFERENCE OF ELECTRONICS, COMMUNICATION AND AEROSPACE TECHNOLOGY (ICECA), VOL 2, 2017, : 419 - 424