Proceedings 2019 Network and Distributed System Security Symposium 2019
DOI: 10.14722/ndss.2019.23197
|View full text |Cite
|
Sign up to set email alerts
|

TEE-aided Write Protection Against Privileged Data Tampering

Abstract: Unauthorized data alteration has been a longstanding threat since the emergence of malware. System and application software can be reinstalled and hardware can be replaced, but user data is priceless in many cases. Especially in recent years, ransomware has become high-impact due to its direct monetization model. State-of-the-art defenses are mostly based on known signature or behavior analysis, and more importantly, require an uncompromised OS kernel. However, malware with the highest software privileges has … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
8
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(8 citation statements)
references
References 24 publications
0
8
0
Order By: Relevance
“…Project Almanac [13] versions all files at the disk level to protect data from privileged malware. Inuksuk [36] uses Intel TXT and self-encryption disk (SED) to protect data by copying it to a protected partition. Inuksuk, like SGX-SSD, can selectively protect files in the disk.…”
Section: Related Workmentioning
confidence: 99%
“…Project Almanac [13] versions all files at the disk level to protect data from privileged malware. Inuksuk [36] uses Intel TXT and self-encryption disk (SED) to protect data by copying it to a protected partition. Inuksuk, like SGX-SSD, can selectively protect files in the disk.…”
Section: Related Workmentioning
confidence: 99%
“…IPFS may detect the data tampered when reading it, but cannot prevent it. Figure 2(b) shows the fresh data attack surface in Inuksuk [30]. Secure Encryption Disk (SED) in Inuksuk is composed of normal partition and secure partition.…”
Section: Motivationmentioning
confidence: 99%
“…In order to prevent such ransomware and wiper attacks, various studies such as IPFS [9], Pesos Object Store [16], and Inuksuk [30] have been conducted [9,16,30]. These systems make a process space a Trusted Execution Environment (TEE) [27] to defend against the aforementioned data tampering attacks.…”
mentioning
confidence: 99%
See 2 more Smart Citations