2015
DOI: 10.1007/978-3-319-18491-3_3
|View full text |Cite
|
Sign up to set email alerts
|

Simple and Practical Integrity Models for Binaries and Files

Abstract: Software environments typically depend on implicit sharing of binaries where binaries are created, loaded/executed and updated dynamically which we call the binary lifecycle. Windows is one example where many attacks exploit vulnerabilities in the binary lifecycle of software. In this paper, we propose a family of binary integrity models with a simple and easy to use trust model, to help protect against such attacks. We implement a prototype in Windows which protects against a variety of common binary attacks.… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 9 publications
0
1
0
Order By: Relevance
“…Having an initially trusted binary application as input, application‐level intrusion detection systems (app‐IDSs) are specific types of HIDSs try to find anomalous behaviours of the specific application. The approach could be used as a complementary method even if the system is protected by preventive approaches such as binary access control [7], authentication [8], or attestation [9, 10].…”
Section: Introductionmentioning
confidence: 99%
“…Having an initially trusted binary application as input, application‐level intrusion detection systems (app‐IDSs) are specific types of HIDSs try to find anomalous behaviours of the specific application. The approach could be used as a complementary method even if the system is protected by preventive approaches such as binary access control [7], authentication [8], or attestation [9, 10].…”
Section: Introductionmentioning
confidence: 99%