A Taxonomy of Software Integrity Protection Techniques

被引:16
作者
Ahmadvand, Mohsen [1 ]
Pretschner, Alexander [1 ]
Kelbert, Florian [2 ]
机构
[1] Tech Univ Munich, Munich, Germany
[2] Imperial Coll London, London, England
来源
ADVANCES IN COMPUTERS, VOL 112 | 2019年 / 112卷
关键词
SYSTEM;
D O I
10.1016/bs.adcom.2017.12.007
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Tampering with software by man-at-the-end (MATE) attackers is an attack that can lead to security circumvention, privacy violation, reputation damage, and revenue loss. In this model, adversaries are end users who have full control over software as well as its execution environment. This full control enables them to tamper with programs to their benefit and to the detriment of software vendors or other end users. Software integrity protection research seeks for means to mitigate those attacks. Since the seminal work of Aucsmith, a great deal of research effort has been devoted to fight MATE attacks, and many protection schemes were designed by both academia and industry. Advances in trusted hardware, such as TPM and Intel SGX, have also enabled researchers to utilize such technologies for additional protection. Despite the introduction of various protection schemes, there is no comprehensive comparison study that points out advantages and disadvantages of different schemes. Constraints of different schemes and their applicability in various industrial settings have not been studied. More importantly, except for some partial classifications, to the best of our knowledge, there is no taxonomy of integrity protection techniques. These limitations have left practitioners in doubt about effectiveness and applicability of such schemes to their infrastructure. In this work, we propose a taxonomy that captures protection processes by encompassing system, defense and attack perspectives. Later, we carry out a survey and map reviewed papers on our taxonomy. Finally, we correlate different dimensions of the taxonomy and discuss observations along with research gaps in the field.
引用
收藏
页码:413 / 486
页数:74
相关论文
共 89 条
[1]  
Abadi Martin, 2005, P 12 ACM C COMPUTER, P340
[2]   Man-At-The-End attacks: Analysis, taxonomy, human aspects, motivation and future directions [J].
Akhunzada, Adnan ;
Sookhak, Mehdi ;
Anuar, Nor Badrul ;
Gani, Abdullah ;
Ahmed, Ejaz ;
Shiraz, Muhammad ;
Furnell, Steven ;
Hayat, Amir ;
Khan, Muhammad Khurram .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2015, 48 :44-57
[3]   Preventing memory error exploits with WIT [J].
Akritidis, Periklis ;
Cadar, Cristian ;
Raiciu, Costin ;
Costa, Manuel ;
Castro, Miguel .
PROCEEDINGS OF THE 2008 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2008, :263-+
[4]  
Anckaert B., 2006, P ACM WORKSH DIG RIG, P47
[5]  
[Anonymous], PROJECTSAURON TOP LE
[6]  
[Anonymous], 2003, ACM Conf. on Computer and Communications Security (CCS)
[7]  
[Anonymous], DETECTION INTRUSIONS
[8]  
[Anonymous], ADV CRYPTOLOGY CRYPT
[9]  
[Anonymous], INT WORKSH INF HID S
[10]  
[Anonymous], P 37 IEEE S SEC PRIV