Skip to main content

Efficient, Scalable and Privacy Preserving Application Attestation in a Multi Stakeholder Scenario

  • Conference paper
  • First Online:
Computational Science and Its Applications -- ICCSA 2016 (ICCSA 2016)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9789))

Included in the following conference series:

Abstract

Measurement and reporting of dynamic behavior of a target application is a pressing issue in the Trusted Computing paradigm. Remote attestation is a part of trusted computing, which allows monitoring and verification of a complete operating system or a specific application by a remote party. Several static remote attestation techniques have been proposed in the past but most of the feasible ones are static in nature. However, such techniques cannot cater to dynamic attacks such as the infamous Heartbleed bug. Dynamic attestation offers a solution to this issue but is impractical due to the infeasibility of measurement and reporting of enormous runtime data. To an extent, it is possible to measure and report the dynamic behavior of a single application but not the complete operating system. The contribution of this paper is to provide the design and implementation of a scalable dynamic remote attestation mechanism that can measure and report multiple applications from different stakeholders simultaneously while ensuring privacy of each stakeholder. We have implemented our reference monitor and tested on Linux Kernel. We show through empirical results that this design is high scalable and feasible for a large number of stakeholders.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Canali, D., Lanzi, A., Balzarotti, D., Kruegel, C., Christodorescu, M., Kirda, E.: A quantitative study of accuracy in system call-based malware detection. In: Proceedings of the 2012 International Symposium on Software Testing and Analysis, pp. 122–132. ACM (2012)

    Google Scholar 

  2. Uppuluri, P., Sekar, R.: Experiences with specification-based intrusion detection. In: Lee, W., Mé, L., Wespi, A. (eds.) RAID 2001. LNCS, vol. 2212, pp. 172–189. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  3. Ni, L., Zheng, H.-Y.: An unsupervised intrusion detection method combined clustering with chaos simulated annealing. In: 2007 International Conference on Machine Learning and Cybernetics, vol. 6, pp. 3217–3222. IEEE (2007)

    Google Scholar 

  4. Milenković, M., Milenković, A., Jovanov, E.: Hardware support forcode integrity in embedded processors. In: Proceedings of the 2005 International Conference on Compilers, Architectures and Synthesis for Embedded Systems, pp. 55–65. ACM (2005)

    Google Scholar 

  5. Trusting Computing Group (2014). http://www.trustedcomputinggroup.org/. Accessed 17 Dec 2015

  6. Coker, G., Guttman, J., Loscocco, P., Herzog, A., Millen, J., OHanlon, B., Ramsdell, J., Segall, A., Sheehy, J., Sniffen, B.: Principles of remote attestation. Int. J. Inform. Secur. 10(2), 63–81 (2011). http://dx.doi.org/10.1007/s10207-011-0124-7

    Article  Google Scholar 

  7. Sailer, R., Zhang, X., Jaeger, T., Van Doorn, L.: Design and implementation of a TCG-based integrity measurement architecture

    Google Scholar 

  8. Gu, L., Ding, X., Deng, R.H., Xie, B., Mei, H.: Remote attestation on program execution. In: Proceedings of the 3rd ACM Workshop on Scalable Trusted computing, ser. STC 2008, pp. 11–20. ACM, New York (2008). http://doi.acm.org/10.1145/1456455.1456458

  9. Kil, C., Sezer, E.C., Azab, A.M., Ning, P., Zhang, X.: Remote attestation to dynamic system properties: towards providing complete system integrity evidence. In: IEEE/IFIP International Conference on Dependable Systems & Networks, DSN 2009, pp. 115–124. IEEE (2009)

    Google Scholar 

  10. Prandini, M., Ramilli, M.: Return-oriented programming. IEEE Secur. Priv. 10(6), 84–87 (2012)

    Article  Google Scholar 

  11. Durumeric, Z., Kasten, J., Adrian, D., Halderman, J.A., Bailey, M., Li, F., Weaver, N., Amann, J., Beekman, J., Payer, M., et al.: The matter of heartbleed. In: Proceedings of the 2014 Conference on Internet Measurement Conference, pp. 475–488. ACM (2014)

    Google Scholar 

  12. Loscocco, P.A., Wilson, P.W., Pendergrass, J.A., McDonell, C.D.: Linuxkernel integrity measurement using contextual inspection. In: Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing, ser. STC 2007, pp. 21–29. ACM, New York (2007). http://doi.acm.org/10.1145/1314354.1314362

  13. Liang, G., Ding, X., Deng, R.H., Xie, B., Mei, H.: Remote attestation on function execution (2009)

    Google Scholar 

  14. Tanveer, T.A., Alam, M., Nauman, M.: Scalable remote attestation with privacy protection. In: Chen, L., Yung, M. (eds.) INTRUST 2009. LNCS, vol. 6163, pp. 73–87. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  15. Alam, M., Zhang, X., Nauman, M., Ali, T., Seifert, J.-P.: Model-basedbehavioral attestation. In: Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, pp. 175–184. ACM (2008)

    Google Scholar 

  16. Ismail, R., Syed, T.A., Musa, S.: Design and implementation of an efficient framework for behaviour attestation using n-call slides. In: Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, p. 36. ACM (2014)

    Google Scholar 

  17. Gong, Y., Mabu, S., Chen, C., Wang, Y., Hirasawa, K.: Intrusion detection system combining misuse detection and anomaly detection using genetic network programming. In: ICCAS-SICE 2009, pp. 3463–3467. IEEE (2009)

    Google Scholar 

  18. Creech, G., Hu, J.: A semantic approach to host-based intrusion detection systems using contiguous and discontiguous system call patterns. IEEE Trans. Comput. 63(4), 807–819 (2014)

    Article  MathSciNet  Google Scholar 

  19. Yin, H., Song, D., Egele, M., Kruegel, C., Kirda, E.: Panorama: capturing system-wide information flow for malware detection and analysis. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 116–127. ACM (2007)

    Google Scholar 

  20. Ali, T., Alam, M., Nauman, M., Ali, T., Ali, M., Anwar, S.: A scalable andprivacy preserving remote attestation mechanism. Inform. Int. Interdisc. J. 14(4), 1193–1203 (2011)

    Google Scholar 

  21. Ismail, R., Syed, T.A., Musa, S.: Design and implementation of an efficient framework for behaviour attestation using n-call slides. In: Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, ser. ICUIMC 2014, pp. 36:1–36:8. ACM, New York (2014). http://doi.acm.org/10.1145/2557977.2558002

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Toqeer Ali .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Ali, T., Ali, J., Ali, T., Nauman, M., Musa, S. (2016). Efficient, Scalable and Privacy Preserving Application Attestation in a Multi Stakeholder Scenario. In: Gervasi, O., et al. Computational Science and Its Applications -- ICCSA 2016. ICCSA 2016. Lecture Notes in Computer Science(), vol 9789. Springer, Cham. https://doi.org/10.1007/978-3-319-42089-9_29

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-42089-9_29

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-42088-2

  • Online ISBN: 978-3-319-42089-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics