skip to main content
10.1145/1095810.1095812acmconferencesArticle/Chapter ViewAbstractPublication PagessospConference Proceedingsconference-collections
Article

Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems

Published:20 October 2005Publication History

ABSTRACT

We propose a primitive, called Pioneer, as a first step towards verifiable code execution on untrusted legacy hosts. Pioneer does not require any hardware support such as secure co-processors or CPU-architecture extensions. We implement Pioneer on an Intel Pentium IV Xeon processor. Pioneer can be used as a basic building block to build security systems. We demonstrate this by building a kernel rootkit detector.

References

  1. Tripwire. http://sourceforge.net/projects/tripwire/.Google ScholarGoogle Scholar
  2. VMware. http://www.vmware.com/.Google ScholarGoogle Scholar
  3. AMD platform for trustworthy computing. In WinHEC, September 2003.Google ScholarGoogle Scholar
  4. Secure virtual machine architecture reference manual. AMD Corp., May 2005.Google ScholarGoogle Scholar
  5. Network Appliance. Postmark: A new file system benchmark. Available at http://www.netapp.com/techlibrary/3022.html, 2004.Google ScholarGoogle Scholar
  6. W. Arbaugh. Personal communication, May 2005.Google ScholarGoogle Scholar
  7. D. Boggs, A. Baktha, J. Hawkins, D. Marr, J. Miller, P. Roussel, R. Singhal, B. Toll, and K.S. Venkatraman. The microarchitecture of the Intel Pentium 4 processor on 90nm technology. Intel Technology Journal, 8(01), February 2004.Google ScholarGoogle Scholar
  8. B. Chen and R. Morris. Certifying program execution with secure procesors. In Proceedings of HotOS IX, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. A. Chuvakin. Ups and downs of unix/linux host-based security solutions. ;login: The Magazine of USENIX and SAGE, 28(2), April 2003.Google ScholarGoogle Scholar
  10. Free Software Foundation. superopt - finds the shortest instruction sequence for a given function. http://www.gnu.org/directory/devel/compilers/superopt.html.Google ScholarGoogle Scholar
  11. T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh. Terra: A virtual machine-based platform for trusted computing. In In Proceedings of ACM Symposium on Operating Systems Principles (SOSP), 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Intel Corp. LaGrande Technology Architectural Overview, September 2003.Google ScholarGoogle Scholar
  13. Intel Corporation. IA32 Intel Architecture Software Developer's Manual Vol.1.Google ScholarGoogle Scholar
  14. K. J. Jones. Loadable Kernel Modules. ;login: The Magazine of USENIX and SAGE, 26(7), November 2001.Google ScholarGoogle Scholar
  15. R. Joshi, G. Nelson, and K. Randall. Denali: a goal-directed superoptimizer. In Proceedings of ACM Conference on Programming Language Design and Implementation (PLDI), pages 304--314, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. R. Kennell and L. Jamieson. Establishing the genuinity of remote computer systems. In Proceedings of USENIX Security Symposium, August 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. S. King and P. Chen. Backtracking intrusions. In Proceedings of the ACM Symposium on Operating Systems Principles (SOSP), pages 223--236, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. A. Klimov and A. Shamir. A new class of invertible mappings. In CHES '02: Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems, pages 470--483, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. N. Petroni, T. Fraser, J. Molina, and W. Arbaugh. Copilot - a coprocessor-based kernel runtime integrity monitor. In Proceedings of USENIX Security Symposium, pages 179--194, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. R. Sailer, X. Zhang, T. Jaeger, and L. van Doorn. Design and implementation of a TCG-based integrity measurement architecture. In Proceedings of USENIX Security Symposium, pages 223--238, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. A. Seshadri, A. Perrig, L. van Doorn, and P. Khosla. SWATT: Software-based attestation for embedded devices. In Proceedings of IEEE Symposium on Security and Privacy, May 2004.Google ScholarGoogle ScholarCross RefCross Ref
  22. U. Shankar, M. Chew, and J. D. Tygar. Side effects are not sufficient to authenticate software. In Proceedings of USENIX Security Symposium, pages 89--101, August 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. E. Shi, A. Perrig, and L. van Doorn. Bind: A fine-grained attestation service for secure distributed systems. In Proc. of the IEEE Symposium on Security and Privacy, pages 154--168, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Trusted Computing Group (TCG). https://www.trustedcomputinggroup.org/, 2003.Google ScholarGoogle Scholar
  25. Xiaoyun Wang, Yiqun Yin, and Hongbo Yu. Finding collisions in the full sha-1. In Proceedings of Crypto, August 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Y. Wang, R. Roussev, C. Verbowski, A. Johnson, and D. Ladd. AskStrider: What has changed on my machine lately? Technical Report MSR-TR-2004-03, Microsoft Research, 2004.Google ScholarGoogle Scholar
  27. Y. Wang, B. Vo, R. Roussev, C. Verbowski, and A. Johnson. Strider GhostBuster: Why it's a bad idea for stealth software to hide files. Technical Report MSR-TR-2004-71, Microsoft Research, 2004.Google ScholarGoogle Scholar
  28. G. Wurster, P. van Oorschot, and A. Somayaji. A generic attack on checksumming-based software tamper resistance. In Proceedings of IEEE Symposium on Security and Privacy, May 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. D. Zovi. Kernel rootkits. http://www.cs.unm.edu/~ghandi/lkr.pdf.Google ScholarGoogle Scholar

Index Terms

  1. Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Conferences
              SOSP '05: Proceedings of the twentieth ACM symposium on Operating systems principles
              October 2005
              259 pages
              ISBN:1595930795
              DOI:10.1145/1095810
              • cover image ACM SIGOPS Operating Systems Review
                ACM SIGOPS Operating Systems Review  Volume 39, Issue 5
                SOSP '05
                December 2005
                290 pages
                ISSN:0163-5980
                DOI:10.1145/1095809
                Issue’s Table of Contents

              Copyright © 2005 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 20 October 2005

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • Article

              Acceptance Rates

              Overall Acceptance Rate131of716submissions,18%

              Upcoming Conference

              SOSP '24

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader