Data-Provenance Verification For Secure Hosts

被引:17
作者
Xu, Kui [1 ]
Xiong, Huijun [1 ]
Stefan, Deian [2 ]
Yao, Danfeng [1 ]
机构
[1] Virginia Tech, Dept Comp Sci, Blacksburg, VA 24060 USA
[2] Cooper Union Stanford Univ, Stanford, CA 94305 USA
基金
美国国家科学基金会;
关键词
Authentication; malware; cryptography; provenance; networking;
D O I
10.1109/TDSC.2011.50
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Malicious software typically resides stealthily on a user's computer and interacts with the user's computing resources. Our goal in this work is to improve the trustworthiness of a host and its system data. Specifically, we provide a new mechanism that ensures the correct origin or provenance of critical system information and prevents adversaries from utilizing host resources. We define data-provenance integrity as the security property stating that the source where a piece of data is generated cannot be spoofed or tampered with. We describe a cryptographic provenance verification approach for ensuring system properties and system-data integrity at kernel-level. Its two concrete applications are demonstrated in the keystroke integrity verification and malicious traffic detection. Specifically, we first design and implement an efficient cryptographic protocol that enforces keystroke integrity by utilizing on-chip Trusted Computing Platform (TPM). The protocol prevents the forgery of fake key events by malware under reasonable assumptions. Then, we demonstrate our provenance verification approach by realizing a lightweight framework for restricting outbound malware traffic. This traffic-monitoring framework helps identify network activities of stealthy malware, and lends itself to a powerful personal firewall for examining all outbound traffic of a host that cannot be bypassed.
引用
收藏
页码:173 / 183
页数:11
相关论文
共 37 条
[1]  
[Anonymous], P 5 INT C NETW SYST
[2]  
[Anonymous], 2007, P 14 ACM C COMP COMM
[3]  
[Anonymous], 2007, ESEC FSE 2007
[4]  
BALIGA A, 2008, P 24 ANN COMP SEC AP
[5]   Lurking in the shadows: Identifying systemic threats to kernel data (Short paper) [J].
Baliga, Arati ;
Kamat, Pandurang ;
Iftode, Liviu .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :246-+
[6]  
Blackburn B., 1999, B BLACKBURN WORLDS F
[7]  
CUI W, 2005, P 21 ACSAC, P361
[8]   LATTICE MODEL OF SECURE INFORMATION-FLOW [J].
DENNING, DE .
COMMUNICATIONS OF THE ACM, 1976, 19 (05) :236-243
[9]   CERTIFICATION OF PROGRAMS FOR SECURE INFORMATION-FLOW [J].
DENNING, DE ;
DENNING, PJ .
COMMUNICATIONS OF THE ACM, 1977, 20 (07) :504-513
[10]   Analyzing Information Flow in Java']JavaScript-based Browser Extensions [J].
Dhawan, Mohan ;
Ganapathy, Vinod .
25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, 2009, :382-391