Determining the integrity of application binaries on unsecure legacy machines using software based remote attestation

4Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Integrity of computing platforms is paramount. A platform is as secure as the applications executing on it. All applications are created with some inherent vulnerability or loophole. Attackers can analyze the presence of flaws in a particular binary and exploit them. Traditional virus scanners are also binaries which can be attacked by malware. This paper implements a method known as Remote Attestation entirely in software to attest the integrity of a process using a trusted external server. The trusted external server issues a challenge to the client machine which responds to the challenge. The response determines the integrity of the application. © 2010 Springer-Verlag.

Cite

CITATION STYLE

APA

Srinivasan, R., Dasgupta, P., Gohad, T., & Bhattacharya, A. (2010). Determining the integrity of application binaries on unsecure legacy machines using software based remote attestation. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6503 LNCS, pp. 66–80). https://doi.org/10.1007/978-3-642-17714-9_6

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free