Abstract
Measurement and reporting of dynamic behavior of a target application is a pressing issue in the Trusted Computing paradigm. Remote attestation is a part of trusted computing, which allows monitoring and verification of a complete operating system or a specific application by a remote party. Several static remote attestation techniques have been proposed in the past but most of the feasible ones are static in nature. However, such techniques cannot cater to dynamic attacks such as the infamous Heartbleed bug. Dynamic attestation offers a solution to this issue but is impractical due to the infeasibility of measurement and reporting of enormous runtime data. To an extent, it is possible to measure and report the dynamic behavior of a single application but not the complete operating system. The contribution of this paper is to provide the design and implementation of a scalable dynamic remote attestation mechanism that can measure and report multiple applications from different stakeholders simultaneously while ensuring privacy of each stakeholder. We have implemented our reference monitor and tested on Linux Kernel. We show through empirical results that this design is high scalable and feasible for a large number of stakeholders.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Canali, D., Lanzi, A., Balzarotti, D., Kruegel, C., Christodorescu, M., Kirda, E.: A quantitative study of accuracy in system call-based malware detection. In: Proceedings of the 2012 International Symposium on Software Testing and Analysis, pp. 122–132. ACM (2012)
Uppuluri, P., Sekar, R.: Experiences with specification-based intrusion detection. In: Lee, W., Mé, L., Wespi, A. (eds.) RAID 2001. LNCS, vol. 2212, pp. 172–189. Springer, Heidelberg (2001)
Ni, L., Zheng, H.-Y.: An unsupervised intrusion detection method combined clustering with chaos simulated annealing. In: 2007 International Conference on Machine Learning and Cybernetics, vol. 6, pp. 3217–3222. IEEE (2007)
Milenković, M., Milenković, A., Jovanov, E.: Hardware support forcode integrity in embedded processors. In: Proceedings of the 2005 International Conference on Compilers, Architectures and Synthesis for Embedded Systems, pp. 55–65. ACM (2005)
Trusting Computing Group (2014). http://www.trustedcomputinggroup.org/. Accessed 17 Dec 2015
Coker, G., Guttman, J., Loscocco, P., Herzog, A., Millen, J., OHanlon, B., Ramsdell, J., Segall, A., Sheehy, J., Sniffen, B.: Principles of remote attestation. Int. J. Inform. Secur. 10(2), 63–81 (2011). http://dx.doi.org/10.1007/s10207-011-0124-7
Sailer, R., Zhang, X., Jaeger, T., Van Doorn, L.: Design and implementation of a TCG-based integrity measurement architecture
Gu, L., Ding, X., Deng, R.H., Xie, B., Mei, H.: Remote attestation on program execution. In: Proceedings of the 3rd ACM Workshop on Scalable Trusted computing, ser. STC 2008, pp. 11–20. ACM, New York (2008). http://doi.acm.org/10.1145/1456455.1456458
Kil, C., Sezer, E.C., Azab, A.M., Ning, P., Zhang, X.: Remote attestation to dynamic system properties: towards providing complete system integrity evidence. In: IEEE/IFIP International Conference on Dependable Systems & Networks, DSN 2009, pp. 115–124. IEEE (2009)
Prandini, M., Ramilli, M.: Return-oriented programming. IEEE Secur. Priv. 10(6), 84–87 (2012)
Durumeric, Z., Kasten, J., Adrian, D., Halderman, J.A., Bailey, M., Li, F., Weaver, N., Amann, J., Beekman, J., Payer, M., et al.: The matter of heartbleed. In: Proceedings of the 2014 Conference on Internet Measurement Conference, pp. 475–488. ACM (2014)
Loscocco, P.A., Wilson, P.W., Pendergrass, J.A., McDonell, C.D.: Linuxkernel integrity measurement using contextual inspection. In: Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing, ser. STC 2007, pp. 21–29. ACM, New York (2007). http://doi.acm.org/10.1145/1314354.1314362
Liang, G., Ding, X., Deng, R.H., Xie, B., Mei, H.: Remote attestation on function execution (2009)
Tanveer, T.A., Alam, M., Nauman, M.: Scalable remote attestation with privacy protection. In: Chen, L., Yung, M. (eds.) INTRUST 2009. LNCS, vol. 6163, pp. 73–87. Springer, Heidelberg (2010)
Alam, M., Zhang, X., Nauman, M., Ali, T., Seifert, J.-P.: Model-basedbehavioral attestation. In: Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, pp. 175–184. ACM (2008)
Ismail, R., Syed, T.A., Musa, S.: Design and implementation of an efficient framework for behaviour attestation using n-call slides. In: Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, p. 36. ACM (2014)
Gong, Y., Mabu, S., Chen, C., Wang, Y., Hirasawa, K.: Intrusion detection system combining misuse detection and anomaly detection using genetic network programming. In: ICCAS-SICE 2009, pp. 3463–3467. IEEE (2009)
Creech, G., Hu, J.: A semantic approach to host-based intrusion detection systems using contiguous and discontiguous system call patterns. IEEE Trans. Comput. 63(4), 807–819 (2014)
Yin, H., Song, D., Egele, M., Kruegel, C., Kirda, E.: Panorama: capturing system-wide information flow for malware detection and analysis. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 116–127. ACM (2007)
Ali, T., Alam, M., Nauman, M., Ali, T., Ali, M., Anwar, S.: A scalable andprivacy preserving remote attestation mechanism. Inform. Int. Interdisc. J. 14(4), 1193–1203 (2011)
Ismail, R., Syed, T.A., Musa, S.: Design and implementation of an efficient framework for behaviour attestation using n-call slides. In: Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, ser. ICUIMC 2014, pp. 36:1–36:8. ACM, New York (2014). http://doi.acm.org/10.1145/2557977.2558002
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Ali, T., Ali, J., Ali, T., Nauman, M., Musa, S. (2016). Efficient, Scalable and Privacy Preserving Application Attestation in a Multi Stakeholder Scenario. In: Gervasi, O., et al. Computational Science and Its Applications -- ICCSA 2016. ICCSA 2016. Lecture Notes in Computer Science(), vol 9789. Springer, Cham. https://doi.org/10.1007/978-3-319-42089-9_29
Download citation
DOI: https://doi.org/10.1007/978-3-319-42089-9_29
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-42088-2
Online ISBN: 978-3-319-42089-9
eBook Packages: Computer ScienceComputer Science (R0)