We present Conqueror, a software-based attestation scheme for tamper-proof code execution on untrusted legacy systems. Beside providing load-time attestation of a piece of code, Conqueror also ensures run-time integrity. Conqueror constitutes a valid alternative to trusted computing platforms, for systems lacking specialized hardware for attestation. We implemented a prototype, specific for the Intel x86 architecture, and evaluated the proposed scheme. Our evaluation showed that, compared to competitors, Conqueror is resistant to static and dynamic attacks and that our scheme represents an important building block for realizing new security systems. © 2010 Springer-Verlag Berlin Heidelberg.
CITATION STYLE
Martignoni, L., Paleari, R., & Bruschi, D. (2010). Conqueror: Tamper-proof code execution on legacy systems. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6201 LNCS, pp. 21–40). https://doi.org/10.1007/978-3-642-14215-4_2
Mendeley helps you to discover research relevant for your work.