Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2008
DOI: 10.1109/sp.2008.35
|View full text |Cite
|
Sign up to set email alerts
|

Practical Proactive Integrity Preservation: A Basis for Malware Defense

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

1
48
0

Year Published

2009
2009
2015
2015

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 32 publications
(51 citation statements)
references
References 10 publications
1
48
0
Order By: Relevance
“…Researchers have recently proposed practical approaches to integrity that approximate classical integrity models [47,21,50,20,40]. These practical integrity models are all strictly weaker than classical models, in that they do not require formal assurance for code with the authority to protect integrity while receiving untrusted inputs.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Researchers have recently proposed practical approaches to integrity that approximate classical integrity models [47,21,50,20,40]. These practical integrity models are all strictly weaker than classical models, in that they do not require formal assurance for code with the authority to protect integrity while receiving untrusted inputs.…”
Section: Related Workmentioning
confidence: 99%
“…Recently, researchers have proposed a variety of approaches to enforce information flow integrity focusing on system abstractions [21,47,50,20,56,57]. All of the above approaches require that administrators replace the commodity system policies with a new information flow policy that includes mediators.…”
mentioning
confidence: 99%
See 1 more Smart Citation
“…However, formal assurance of the correctness of these programs is necessary to justify such behavior in the Clark-Wilson model. While formal assurance for programs appeared to be emerging as a viable technology in 1987 (i.e., when the Clark-Wilson model was proposed), it is now widely believed that formal assurance of complete applications is impractical, so new interpretations of integrity have recently been proposed [30,18,35]. These interpretations require that high integrity programs are designed to only accept untrusted inputs at interfaces where integrity decisions can be enforced.…”
Section: Integritymentioning
confidence: 99%
“…The design of our approach is based on three insights. First, we leverage emerging work on practical integrity models [30,18,35] that define comprehensive and practical integrity model for general purpose systems. Our approach generates proofs that a remote party can use to determine whether a virtual machine's execution adheres to an approximation of Clark-Wilson integrity [30].…”
Section: Introductionmentioning
confidence: 99%