TY - GEN
T1 - DR@FT
T2 - 15th European Symposium on Research in Computer Security, ESORICS 2010
AU - Xu, Wenjuan
AU - Ahn, Gail-Joon
AU - Hu, Hongxin
AU - Zhang, Xinwen
AU - Seifert, Jean Pierre
N1 - Funding Information:
The work of Gail-J.Ahn and Hongxin Hu was partially supported by National Science Foundation (NSF-IIS-0900970 and NSF-CNS-0831360).
PY - 2010
Y1 - 2010
N2 - Remote attestation is an important mechanism to provide the trustworthiness proof of a computing system by verifying its integrity. In this paper, we propose an innovative remote attestation framework called DR@FT for efficiently measuring a target system based on an information flow-based integrity model. With this model, the high integrity processes of a system are first verified through measurements and these processes are then protected from accesses initiated by low integrity processes. Also, our framework verifies the latest state changes in a dynamic system instead of considering the entire system information. In addition, we adopt a graph-based method to represent integrity violations with a ranked violation graph, which supports intuitive reasoning of attestation results. Our experiments and performance evaluation demonstrate the feasibility and practicality of DR@FT.
AB - Remote attestation is an important mechanism to provide the trustworthiness proof of a computing system by verifying its integrity. In this paper, we propose an innovative remote attestation framework called DR@FT for efficiently measuring a target system based on an information flow-based integrity model. With this model, the high integrity processes of a system are first verified through measurements and these processes are then protected from accesses initiated by low integrity processes. Also, our framework verifies the latest state changes in a dynamic system instead of considering the entire system information. In addition, we adopt a graph-based method to represent integrity violations with a ranked violation graph, which supports intuitive reasoning of attestation results. Our experiments and performance evaluation demonstrate the feasibility and practicality of DR@FT.
UR - http://www.scopus.com/inward/record.url?scp=78049369848&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=78049369848&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-15497-3_12
DO - 10.1007/978-3-642-15497-3_12
M3 - Conference contribution
AN - SCOPUS:78049369848
SN - 3642154964
SN - 9783642154966
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 182
EP - 198
BT - Computer Security, ESORICS 2010 - 15th European Symposium on Research in Computer Security, Proceedings
PB - Springer Verlag
Y2 - 20 September 2010 through 22 September 2010
ER -