IFIP – The International Federation for Information Processing
DOI: 10.1007/978-0-387-09428-1_19
|View full text |Cite
|
Sign up to set email alerts
|

A Lightweight Binary Authentication System for Windows

Abstract: The problem of malware is greatly reduced if we can ensure that only software from trusted providers is executed. In this paper, we have built a prototype system on Windows which performs authentication of all binaries in Windows to on Windows are made more complex because there are many kinds of binaries besides executables, e.g. DLLs, drivers, ActiveX controls, etc. We combine this with a simple software ID scheme for software management and vulnerability assessment which leverages on trusted infrastructure … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Publication Types

Select...
3
2

Relationship

2
3

Authors

Journals

citations
Cited by 8 publications
(8 citation statements)
references
References 5 publications
0
8
0
Order By: Relevance
“…The T (f ) signature verification in BInt+tr is cached so that multiple loadings only need a single verification unless the binary is modified. This caching optimization is similar to that in [13] which has been shown to be efficient with negligible overhead for real applications. File writing, renaming and deletion are monitored through the ZwCreateFile and ZwDeleteFile kernel APIs.…”
Section: A Bint Windows Prototypementioning
confidence: 97%
See 3 more Smart Citations
“…The T (f ) signature verification in BInt+tr is cached so that multiple loadings only need a single verification unless the binary is modified. This caching optimization is similar to that in [13] which has been shown to be efficient with negligible overhead for real applications. File writing, renaming and deletion are monitored through the ZwCreateFile and ZwDeleteFile kernel APIs.…”
Section: A Bint Windows Prototypementioning
confidence: 97%
“…Signed binaries only allow signed binaries to be loaded or executed [9,13] However, signing is primarily about establishing trust relationships. It only ensures that the signed binaries are from a party having the key.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…If we consider a computer host to include the host, the user channel, and the network channel, then host security can be divided into: (i) software security, which ensures the software running in the host, is authentic, e.g., antivirus [17], system call filtering [18], and binary authentication [19]; (ii) user security, which ensures the user, is authentic, e.g., password/biometric authentication, physical perimeters, and surveillance camera monitoring; and (iii) network security,which ensures the network communication, is authentic, e.g., personal firewalls [20]. Our approach to enhance host security is substantially different from the existing designs in three aspects.…”
Section: Related Workmentioning
confidence: 99%