Ensuring System Integrity using Limited Local Memory
نویسندگان
چکیده
System integrity monitors, such as rootkit detectors, rely critically on the ability to fetch and inspect pages containing code and data of a target system under study. To avoid being infected by malicious or compromised targets, state of the art system integrity monitors rely on virtualization technology to set up a tamper-proof execution environment. Consequently, the virtualization infrastructure is part of the trusted computing base. However, modern virtual machine monitors are complex entities, with large code bases that are difficult to verify. In this paper, we present a new machine architecture called limited local memory (LLM), which we leverage to set up an alternative tamper-proof execution environment for system integrity monitors. This architecture leverages recent trends in multicore chip design to equip each processing core with access to a small, private memory area. We show that the features of the LLM architecture, combined with a novel secure paging mechanism, suffice to bootstrap a tamper-proof execution environment without support for hardware virtualization. We demonstrate the utility of this architecture by building a rootkit detector that leverages the key features of LLM. This rootkit detector can safely inspect a target operating system without itself becoming the victim of infection.
منابع مشابه
Understanding Internal Accountability in Nigeria’s Routine Immunization System: Perspectives From Government Officials at the National, State, and Local Levels
Background Routine immunization coverage in Nigeria has remained low, and studies have identified a lack of accountability as a barrier to high performance in the immunization system. Accountability lies at the heart of various health systems strengthening efforts recently launched in Nigeria, including those related to immunization. Our aim was to understand the views of health officials on th...
متن کاملدستگاه ایمنی پوست
Skin has some physiologic roles which are performed actively. One of the most important functions of skin is to take part in body immune system. Skin Immune system (SIS) which has local and extra-local effects plays its role through skin associated lymphoid tissues (SALT). SIS provides nonspecific (NI) and specific immunity (SI). NI is effective through PH, fatty acids, antibacterial substances...
متن کاملAn Implementation of Security Extensions for Data Integrity and Confidentiality in Soft-Core Processors
An increasing number of embedded system solutions in space, military, and consumer electronics applications rely on processor cores inside reconfigurable logic devices. Ensuring data integrity and confidentiality is of the utmost importance in many such applications. This paper describes a practical implementation of security extensions for embedded systems built around soft-core processors. Th...
متن کاملSILT : S3 Integrity, Locking, and Transactions
Despite their limited put/get interface, simple hosted storage services are becoming very popular. Many companies and individuals are using them to store and backup data. Recent work has demonstrated that it is even possible to build file systems on top of such abstractions. However, the available API lacks some features that could prove beneficiary in building distributed storage systems on to...
متن کاملAuthentication of Freshness for Outsourced Multi-Version Key-Value Stores
Data outsourcing offers cost-effective computing power to manage massive data streams and reliable access to data. For example, data owners can forward their data to clouds, and the clouds provide data mirroring, backup, and online access services to end users. However, outsourcing data to untrusted clouds requires data authentication and query integrity to remain in the control of the data own...
متن کامل