Conqueror: Tamper-proof code execution on legacy systems

22Citations
Citations of this article
28Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We present Conqueror, a software-based attestation scheme for tamper-proof code execution on untrusted legacy systems. Beside providing load-time attestation of a piece of code, Conqueror also ensures run-time integrity. Conqueror constitutes a valid alternative to trusted computing platforms, for systems lacking specialized hardware for attestation. We implemented a prototype, specific for the Intel x86 architecture, and evaluated the proposed scheme. Our evaluation showed that, compared to competitors, Conqueror is resistant to static and dynamic attacks and that our scheme represents an important building block for realizing new security systems. © 2010 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Martignoni, L., Paleari, R., & Bruschi, D. (2010). Conqueror: Tamper-proof code execution on legacy systems. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6201 LNCS, pp. 21–40). https://doi.org/10.1007/978-3-642-14215-4_2

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free