Dymo: Tracking Dynamic Code Identity

نویسندگان

  • Bob Gilbert
  • Richard A. Kemmerer
  • Christopher Krügel
  • Giovanni Vigna
چکیده

Code identity is a primitive that allows an entity to recognize a known, trusted application as it executes. This primitive supports trusted computing mechanisms such as sealed storage and remote attestation. Unfortunately, there is a generally acknowledged limitation in the implementation of current code identity mechanisms in that they are fundamentally static. That is, code identity is captured at program loadtime and, thus, does not reflect the dynamic nature of executing code as it changes over the course of its run-time. As a result, when a running process is altered, for example, because of an exploit or through injected, malicious code, its identity is not updated to reflect this change. In this paper, we present Dymo, a system that provides a dynamic code identity primitive that tracks the run-time integrity of a process and can be used to detect code integrity attacks. To this end, a host-based component computes an identity label that reflects the executable memory regions of running applications (including dynamically generated code). These labels can be used by the operating system to enforce applicationbased access control policies. Moreover, to demonstrate a practical application of our approach, we implemented an extension to Dymo that labels network packets with information about the process that originated the traffic. Such provenance information is useful for distinguishing between legitimate and malicious activity at the network level.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Comparative Study of DYMO, AODV, DSR & DSDV Routing Protocols in VANET

The need to have Intelligent Vehicle System has paved the way for the rapid emergence of Vehicular Adhoc Networks (VANET) which allows communication to take place between the vehicles. The effective implementation of VANET, a sub class of mobile adhoc networks, depends upon the routing protocols used which behave differently under different environments. This paper attempts to study the behavio...

متن کامل

Performance evaluation of routing protocols in vehicular ad-hoc networks

Vehicular Ad Hoc Networks (VANETs) are a new communication paradigm that enables the communication between vehicles moving at high speeds on the roads. This has opened doors to develop several new applications like traffic engineering, traffic management, dissemination of emergency information to avoid hazardous situations and other user applications. VANETs are direct offshoot of Mobile Ad Hoc...

متن کامل

Simulating DYMO in OMNeT++

Abstract. Mobile Ad Hoc Networks (MANETs) have evolved in the last years into standards in the communication world. By definition, they do not need any network infrastructure to ensure communication between the nodes. Therefore, they are dealing with new challenges in the context of ad hoc routing. This paper deals with our new implementation of the routing protocol Dynamic MANET On Demand (DYM...

متن کامل

Impact of Radio Propagation Model and Mobility in On-demand Routing Protocol of Manet

Accuracy of routing protocol performance in mobile ad hoc network (MANET) depends on many parameters. Besides many parameters propagation model and node velocity are the two among them. Node mobility is responsible for network topology and propagation model for calculating signal strength at receiver. In wireless network MANET suffers a huge loss in performance due to obstacle between transmiss...

متن کامل

Enhanced Anomaly Detection IDS-Based Scheme for Dynamic MANET on-Demand (DYMO) Routing Protocol for MANETS

Mobile Ad hoc network (MANET) is a kind of wireless network which has no infrastructure. Security is an essential requirement in mobile ad hoc network to provide protected communication between mobile nodes. Due to unique characteristic of MANETs, it creates a number of consequential challenges to its security design. In this paper, we propose a new anomaly-detection scheme for Dynamic MANET On...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011