Simple and practical integrity models for binaries and files

2Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Software environments typically depend on implicit sharing of binaries where binaries are created, loaded/executed and updated dynamically which we call the binary lifecycle. Windows is one example where many attacks exploit vulnerabilities in the binary lifecycle of software. In this paper, we propose a family of binary integrity models with a simple and easy to use trust model, to help protect against such attacks. We implement a prototype in Windows which protects against a variety of common binary attacks. Our models are easy to use while maintaining existing software compatibility, i.e. work with the implicit binary lifecycle requirements of the software and assumptions on binary sharing. We also propose a conservative extension to protect critical nonbinary files.

Cite

CITATION STYLE

APA

Wu, Y., & Yap, R. H. C. (2015). Simple and practical integrity models for binaries and files. In IFIP Advances in Information and Communication Technology (Vol. 454, pp. 30–46). Springer New York LLC. https://doi.org/10.1007/978-3-319-18491-3_3

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free