Software-Design for Internal Security Checks with Dynamic Integrity Measurement (DIM)
Title | Software-Design for Internal Security Checks with Dynamic Integrity Measurement (DIM) |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Detken, K. O., Jahnke, M., Rix, T., Rein, A. |
Conference Name | 2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS) |
Keywords | Aerospace electronics, attestation operations, binary code, Binary codes, central components, complex attestation strategies, composability, cooperation project, cryptographic hashes, cryptography, data integrity, DIM, DRA, dynamic integrity measurement, Dynamic Runtime Attestation, extensibility, extensible architecture, Flexibility, flexible architecture, Guidelines, IMA, integrity measurement architecture, internal security checks, Kernel, kernel architecture, Linux, malicious components, Memory management, memory measurment, multiple related components, pubcrawl, Resiliency, security software tools, software design, Software measurement, software tools, system components, system state verification, TCG, The Concise Binary Object Representation (CBOR), Trusted Platform Module (TPM), trusted platform modules |
Abstract | Most security software tools try to detect malicious components by cryptographic hashes, signatures or based on their behavior. The former, is a widely adopted approach based on Integrity Measurement Architecture (IMA) enabling appraisal and attestation of system components. The latter, however, may induce a very long time until misbehavior of a component leads to a successful detection. Another approach is a Dynamic Runtime Attestation (DRA) based on the comparison of binary code loaded in the memory and well-known references. Since DRA is a complex approach, involving multiple related components and often complex attestation strategies, a flexible and extensible architecture is needed. In a cooperation project an architecture was designed and a Proof of Concept (PoC) successfully developed and evaluated. To achieve needed flexibility and extensibility, the implementation facilitates central components providing attestation strategies (guidelines). These guidelines define and implement the necessary steps for all relevant attestation operations, i.e. measurement, reference generation and verification. |
URL | http://ieeexplore.ieee.org/document/8095106/ |
DOI | 10.1109/IDAACS.2017.8095106 |
Citation Key | detken_software-design_2017 |
- security software tools
- internal security checks
- Kernel
- kernel architecture
- Linux
- malicious components
- Memory management
- memory measurment
- multiple related components
- pubcrawl
- Resiliency
- integrity measurement architecture
- software design
- Software measurement
- software tools
- system components
- system state verification
- TCG
- The Concise Binary Object Representation (CBOR)
- Trusted Platform Module (TPM)
- trusted platform modules
- DIM
- attestation operations
- binary code
- Binary codes
- central components
- complex attestation strategies
- composability
- cooperation project
- cryptographic hashes
- Cryptography
- data integrity
- Aerospace electronics
- DRA
- dynamic integrity measurement
- Dynamic Runtime Attestation
- extensibility
- extensible architecture
- flexibility
- flexible architecture
- Guidelines
- IMA