Determining the integrity of application binaries on unsecure legacy machines using software based remote attestation

Raghunathan Srinivasan, Partha Dasgupta, Tushar Gohad, Amiya Bhattacharya

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

Abstract

Integrity of computing platforms is paramount. A platform is as secure as the applications executing on it. All applications are created with some inherent vulnerability or loophole. Attackers can analyze the presence of flaws in a particular binary and exploit them. Traditional virus scanners are also binaries which can be attacked by malware. This paper implements a method known as Remote Attestation entirely in software to attest the integrity of a process using a trusted external server. The trusted external server issues a challenge to the client machine which responds to the challenge. The response determines the integrity of the application.

Original languageEnglish (US)
Title of host publicationInformation Systems Security - 6th International Conference, ICISS 2010, Proceedings
Pages66-80
Number of pages15
DOIs
StatePublished - Dec 1 2010
Event6th International Conference on Information Systems Security, ICISS 2010 - Gandhinagar, India
Duration: Dec 17 2010Dec 19 2010

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume6503 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other6th International Conference on Information Systems Security, ICISS 2010
CountryIndia
CityGandhinagar
Period12/17/1012/19/10

Keywords

  • code injection
  • integrity measurement
  • remote attestation

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Determining the integrity of application binaries on unsecure legacy machines using software based remote attestation'. Together they form a unique fingerprint.

Cite this