Access Control for Binary Integrity Protection using Ethereum

被引:5
作者
Stengele, Oliver [1 ]
Baumeister, Andreas [1 ]
Birnstill, Pascal [2 ]
Hartenstein, Hannes [1 ]
机构
[1] Karlsruhe Inst Technol, Inst Telemat, Karlsruhe, Germany
[2] Fraunhofer IOSB, Karlsruhe, Germany
来源
PROCEEDINGS OF THE 24TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT '19) | 2019年
关键词
Blockchain; binary integrity protection; revocation;
D O I
10.1145/3322431.3325108
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The integrity of executable binaries is essential to the security of any device that runs them. At best, a manipulated binary can leave the system in question open to attack, and at worst, it can compromise the entire system by itself. In recent years, supply-chain attacks have demonstrated that binaries can even be compromised unbeknownst to their creators. This, in turn, leads to the dissemination of supposedly valid binaries that need to be revoked later. In this paper, we present and evaluate a concept for publishing and revoking integrity protecting information for binaries, based on the Ethereum Blockchain and its underlying peer-to-peer network. Smart Contracts are used to enforce access control over the publication and revocation of integrity preserving information, whereas the peer-to-peer network serves as a fast, global communication service to keep user clients informed. The Ethereum Blockchain serves as a tamper-evident, publicly-verifiable log of published and revoked binaries. Our implementation incurs costs comparable to registration fees for centralised software distribution platforms but allows publication and revocation of individual binaries within minutes. The proposed concept can be integrated incrementally into existing software distribution platforms, such as package repositories or various app stores.
引用
收藏
页码:3 / 12
页数:10
相关论文
共 11 条
[1]   Contour: A Practical System for Binary Transparency [J].
Al-Bassam, Mustafa ;
Meiklejohn, Sarah .
DATA PRIVACY MANAGEMENT, CRYPTOCURRENCIES AND BLOCKCHAIN TECHNOLOGY, 2018, 11025 :93-110
[2]   SCPKI: A Smart Contract-based PKI and Identity System [J].
Al-Bassam, Mustafa .
BCC '17: PROCEEDINGS OF THE ACM WORKSHOP ON BLOCKCHAIN, CRYPTOCURRENCIES AND CONTRACTS, 2017, :35-40
[3]  
[Anonymous], 2014, White Paper
[4]   Who Am I? Secure Identity Registration on Distributed Ledgers [J].
Azouvi, Sarah ;
Al-Bassam, Mustafa ;
Meiklejohn, Sarah .
DATA PRIVACY MANAGEMENT, CRYPTOCURRENCIES AND BLOCKCHAIN TECHNOLOGY, 2017, 10436 :373-389
[5]  
Duncan R, 2013, CERTIFICATE REVOCATI
[6]  
Friebe Sebastian, 2018, DECENTID DECENTRALIZ
[7]  
Merkle R.C., 1988, C THEOR APPL CRYPT T, P369, DOI [DOI 10.1007/3-540-48184-2_32, /10.1007/3-540-48184-2]
[8]  
Nakamoto S., 2008, Bitcoin: A Peer-to-Peer Electronic Cash System
[9]  
Nikitin K, 2017, PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), P1271
[10]  
Szabo N., 1997, First Monday, V2