ABSTRACT
We propose a primitive, called Pioneer, as a first step towards verifiable code execution on untrusted legacy hosts. Pioneer does not require any hardware support such as secure co-processors or CPU-architecture extensions. We implement Pioneer on an Intel Pentium IV Xeon processor. Pioneer can be used as a basic building block to build security systems. We demonstrate this by building a kernel rootkit detector.
- Tripwire. http://sourceforge.net/projects/tripwire/.Google Scholar
- VMware. http://www.vmware.com/.Google Scholar
- AMD platform for trustworthy computing. In WinHEC, September 2003.Google Scholar
- Secure virtual machine architecture reference manual. AMD Corp., May 2005.Google Scholar
- Network Appliance. Postmark: A new file system benchmark. Available at http://www.netapp.com/techlibrary/3022.html, 2004.Google Scholar
- W. Arbaugh. Personal communication, May 2005.Google Scholar
- D. Boggs, A. Baktha, J. Hawkins, D. Marr, J. Miller, P. Roussel, R. Singhal, B. Toll, and K.S. Venkatraman. The microarchitecture of the Intel Pentium 4 processor on 90nm technology. Intel Technology Journal, 8(01), February 2004.Google Scholar
- B. Chen and R. Morris. Certifying program execution with secure procesors. In Proceedings of HotOS IX, 2003. Google ScholarDigital Library
- A. Chuvakin. Ups and downs of unix/linux host-based security solutions. ;login: The Magazine of USENIX and SAGE, 28(2), April 2003.Google Scholar
- Free Software Foundation. superopt - finds the shortest instruction sequence for a given function. http://www.gnu.org/directory/devel/compilers/superopt.html.Google Scholar
- T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh. Terra: A virtual machine-based platform for trusted computing. In In Proceedings of ACM Symposium on Operating Systems Principles (SOSP), 2003. Google ScholarDigital Library
- Intel Corp. LaGrande Technology Architectural Overview, September 2003.Google Scholar
- Intel Corporation. IA32 Intel Architecture Software Developer's Manual Vol.1.Google Scholar
- K. J. Jones. Loadable Kernel Modules. ;login: The Magazine of USENIX and SAGE, 26(7), November 2001.Google Scholar
- R. Joshi, G. Nelson, and K. Randall. Denali: a goal-directed superoptimizer. In Proceedings of ACM Conference on Programming Language Design and Implementation (PLDI), pages 304--314, 2002. Google ScholarDigital Library
- R. Kennell and L. Jamieson. Establishing the genuinity of remote computer systems. In Proceedings of USENIX Security Symposium, August 2003. Google ScholarDigital Library
- S. King and P. Chen. Backtracking intrusions. In Proceedings of the ACM Symposium on Operating Systems Principles (SOSP), pages 223--236, 2003. Google ScholarDigital Library
- A. Klimov and A. Shamir. A new class of invertible mappings. In CHES '02: Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems, pages 470--483, 2003. Google ScholarDigital Library
- N. Petroni, T. Fraser, J. Molina, and W. Arbaugh. Copilot - a coprocessor-based kernel runtime integrity monitor. In Proceedings of USENIX Security Symposium, pages 179--194, 2004. Google ScholarDigital Library
- R. Sailer, X. Zhang, T. Jaeger, and L. van Doorn. Design and implementation of a TCG-based integrity measurement architecture. In Proceedings of USENIX Security Symposium, pages 223--238, 2004. Google ScholarDigital Library
- A. Seshadri, A. Perrig, L. van Doorn, and P. Khosla. SWATT: Software-based attestation for embedded devices. In Proceedings of IEEE Symposium on Security and Privacy, May 2004.Google ScholarCross Ref
- U. Shankar, M. Chew, and J. D. Tygar. Side effects are not sufficient to authenticate software. In Proceedings of USENIX Security Symposium, pages 89--101, August 2004. Google ScholarDigital Library
- E. Shi, A. Perrig, and L. van Doorn. Bind: A fine-grained attestation service for secure distributed systems. In Proc. of the IEEE Symposium on Security and Privacy, pages 154--168, 2005. Google ScholarDigital Library
- Trusted Computing Group (TCG). https://www.trustedcomputinggroup.org/, 2003.Google Scholar
- Xiaoyun Wang, Yiqun Yin, and Hongbo Yu. Finding collisions in the full sha-1. In Proceedings of Crypto, August 2005. Google ScholarDigital Library
- Y. Wang, R. Roussev, C. Verbowski, A. Johnson, and D. Ladd. AskStrider: What has changed on my machine lately? Technical Report MSR-TR-2004-03, Microsoft Research, 2004.Google Scholar
- Y. Wang, B. Vo, R. Roussev, C. Verbowski, and A. Johnson. Strider GhostBuster: Why it's a bad idea for stealth software to hide files. Technical Report MSR-TR-2004-71, Microsoft Research, 2004.Google Scholar
- G. Wurster, P. van Oorschot, and A. Somayaji. A generic attack on checksumming-based software tamper resistance. In Proceedings of IEEE Symposium on Security and Privacy, May 2005. Google ScholarDigital Library
- D. Zovi. Kernel rootkits. http://www.cs.unm.edu/~ghandi/lkr.pdf.Google Scholar
Index Terms
- Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems
Recommendations
Pioneer: verifying code integrity and enforcing untampered code execution on legacy systems
SOSP '05We propose a primitive, called Pioneer, as a first step towards verifiable code execution on untrusted legacy hosts. Pioneer does not require any hardware support such as secure co-processors or CPU-architecture extensions. We implement Pioneer on an ...
Computer Industry Pioneer: Erwin Tomash (1921-2012)
Computer industry pioneer and visionary cofounder (with his wife Adelle Tomash) of the Charles Babbage Foundation (CBF) and the Charles Babbage Institute (CBI), Erwin Tomash passed away on 10 December 2012. In the late 1940s, Tomash was an engineer at ...
Retiring computer pioneer—
In retrospect, it is obvious that Charles Babbage, when writing these words, had Howard Aiken in mind. In July 1961, twenty-four years after conceiving the idea that led to Mark I and after over a quarter century of service to Harvard University and to ...
Comments