skip to main content
10.1145/1966913.1966987acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
short-paper

Towards a binary integrity system for windows

Published:22 March 2011Publication History

ABSTRACT

Securing Windows is a challenge because of its large attack surface which can lead to many ways where binaries can be loaded and subsequently executed. Furthermore, the software in the system is itself dynamic as binaries need to be installed, updated and uninstalled. Binaries can also be created dynamically during software development as well as other situations. We present a new binary security model called BinInt which provides integrity for binaries and prevents the use of unauthorized binaries. We have implemented a BinInt prototype designed with usability in mind to be compatible with existing software in binary form. It has low overhead and thus can be permanently on.

References

  1. A. Apvrille, D. Gordon, S. Hallyn, M. Pourzandi and V. Roy, DigSig: Run-time Authentication of Binaries at Kernel Level, USENIX Large Installation System Administration Conf., 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. G. Wurster and P. C. V. Oorschot, Self-Signed Executables: Restricting Replacement of Program Binaries by Malware USENIX Workshop on Hot Topics in Security, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. D. Stevens, Escape From PDF, http://blog.didierstevens.com/2010/03/29/escape-from-pdfGoogle ScholarGoogle Scholar
  4. http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0483Google ScholarGoogle Scholar
  5. http://www.microsoft.com/technet/security/advisory/2269637.mspxGoogle ScholarGoogle Scholar
  6. A. Matrosov, E. Rodionov, D. Harley and J. Malcho, Stuxnet Under the Microscope, http://www.eset.com/resources/whitepapers/Stuxnet_Under_the_Microscope.pdfGoogle ScholarGoogle Scholar
  7. Y. Wu, R. H. C Yap and R. Ramnath, Comprehending Module Dependencies and Sharing, Intl. Conf. on Software Engineering, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. L. V. Doorn, G. Ballintijn and W. A. Arbaugh, Signed Executables for Linux, CS-TR-4256, U. of Maryland, 2001.Google ScholarGoogle Scholar
  9. K. Kato and Y. Oyama, SoftwarePot: an encapsulated transferable file system for secure software circulation, Intl. Symp. on Software Security, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Z. Liang, W. Sun, V. Venkatakrishnan and R. Sekar, Alcatraz: An Isolated Environment for Experimenting with Untrusted Software, ACM Trans. on Information and System Security, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. F. Halim, R. Ramnath, Sufatrio, Y. Wu and R. H. C. Yap, A Lightweight Binary Authentication System for Windows, Joint iTrust and PST Conf. on Privacy, Trust Management and Security, 2008.Google ScholarGoogle Scholar
  12. S. Nanda, W. Li, L. C. Lam and T. C. Chiueh, Foreign Code Detection on the Windows/X86 Platform, Annual Computer Security Applications Conf., 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Safari Carpet bomb, http://www.oreillynet.com/onlamp/blog/2008/05/safari_carpet_bomb.htmlGoogle ScholarGoogle Scholar
  14. M. A. Williams, Anti-Trojan and Trojan Detection with In-Kernel Digital Signature testing of Executables, 2002.Google ScholarGoogle Scholar

Index Terms

  1. Towards a binary integrity system for windows

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          ASIACCS '11: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
          March 2011
          527 pages
          ISBN:9781450305648
          DOI:10.1145/1966913

          Copyright © 2011 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 22 March 2011

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • short-paper

          Acceptance Rates

          ASIACCS '11 Paper Acceptance Rate35of217submissions,16%Overall Acceptance Rate418of2,322submissions,18%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader