Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing 2007
DOI: 10.1145/1314354.1314362
|View full text |Cite
|
Sign up to set email alerts
|

Linux kernel integrity measurement using contextual inspection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
50
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 92 publications
(50 citation statements)
references
References 4 publications
0
50
0
Order By: Relevance
“…Dynamic integrity measurement techniques, such as the ones presented in [5,6,18] have been added as extensions to the Linux Integrity Measurement Unit [2] to detect and prevent return-oriented programming (ROP) attacks. IMUs typically verify the integrity of executable content in an operating system at load-time by inspecting the executable files before loading them; however, the dynamic IMU extensions provide support for run-time detection at the expense of performance overhead.…”
Section: Prior Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Dynamic integrity measurement techniques, such as the ones presented in [5,6,18] have been added as extensions to the Linux Integrity Measurement Unit [2] to detect and prevent return-oriented programming (ROP) attacks. IMUs typically verify the integrity of executable content in an operating system at load-time by inspecting the executable files before loading them; however, the dynamic IMU extensions provide support for run-time detection at the expense of performance overhead.…”
Section: Prior Workmentioning
confidence: 99%
“…We do not address attacks prior to run-time as there have been a plethora of techniques introduced in the literature to help in protecting compile-time code and allocating secure storage for sensitive information [2,29]. From the different types of common weaknesses and vulnerabilities described in Section 2, we focus on software attacks that end up modifying user process code at run-time.…”
Section: Threat Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…An integrity measurement system typically consists of three components: the target system, the measurement agent, and the decision maker [7]. Our first assumption is that the measurement agent is isolated from and independent of the target system, therefore it has a true view of the internal states (including code and data) of the target system.…”
Section: Background On Integrity Measurement and Security Assumptionsmentioning
confidence: 99%
“…Recent research such as ReDAS [5] and DynIMA [45] improve IMA so that they can support runtime measurement of software integrity. Other related work includes [13], [7], [10], [24], [46], and [47]. These approaches have different mechanisms for measurement, but they do not focus on the integrity properties.…”
Section: Integrity Measurement Mechanismsmentioning
confidence: 99%