Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2184751.2184814acmconferencesArticle/Chapter ViewAbstractPublication PagesicuimcConference Proceedingsconference-collections
research-article

A sense of others: behavioral attestation of UNIX processes on remote platforms

Published: 20 February 2012 Publication History
  • Get Citation Alerts
  • Abstract

    Remote attestation is a technique in Trusted Computing to verify the trustworthiness of a client platform. The most well-known method of verifying the client system to the remote end is the Integrity Measurement Architecture (IMA). IMA relies on the hashes of applications to prove the trusted state of the target system to the remote challenger. This hash-based approach leads to several problems including highly rigid target domains. To overcome these problems several dynamic attestation techniques have been proposed. These techniques rely on the runtime behavior of an application or data structures and sequence of system calls. In this paper we propose a new attestation technique that relies on the seminal work done in Sequence Time Delay Embedding (STIDE). We present our target architecture in which the client end is leveraged with STIDE and the short sequences of system call patterns associated with a process are measured and reported to the challenger. Furthermore, we investigate how this technique can shorten the reported data as compared to other system call-based attestation techniques. The primary advantage of this technique is to detect zero-day malware at the client platform. There are two most important metrics for the successful implementation of dynamic behavior attestation. One is the time required for processing on the target system and second is the network overhead. In our proposed model we concentrate on maximizing the efficiency of these metrics.

    References

    [1]
    M. Alam, X. Zhang, M. Nauman, T. Ali, and J-P. Seifert. Model-based Behavioral Attestation. In SACMAT '08: Proceedings of the thirteenth ACM symposium on Access control models and technologies., New York, NY, USA, 2008. ACM Press.
    [2]
    S. Axelsson. Intrusion detection systems: A survey and taxonomy. Technical report, Department of Computer Engineering, Chalmers University, 2000.
    [3]
    L. Davi, A. R. Sadeghi, and M. Winandy. Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks. In Proceedings of the 2009 ACM workshop on Scalable trusted computing, pages 49--54. ACM, 2009.
    [4]
    S. Forrest, SA Hofmeyr, A. Somayaji, and TA Longstaff. A sense of self for unix processes. In 1996 IEEE Symposium on Security and Privacy, 1996. Proceedings., pages 120--128, 1996.
    [5]
    Liang Gu, Yueqiang Cheng, Xuhua Ding, Robert Deng, Yao Guo, and Weizhong Shao. Remote Attestation on Function Execution. In InTrust'09: Proceedings of the 2009 International Conference on Trusted Systems, 2009.
    [6]
    Liang Gu, Xuhua Ding, Robert Deng, Bing Xie, and Hong Mei. Remote Attestation on Program Execution. In STC '08: Proceedings of the 2008 ACM Workshop on Scalable Trusted Computing, New York, NY, USA, 2008. ACM.
    [7]
    S. A. Hofmeyr, S. Forrest, and A. Somayaji. Intrusion detection using sequences of system calls. Journal of Computer Security, 6(3):151--180, 1998.
    [8]
    Trent Jaeger, Reiner Sailer, and Umesh Shankar. PRIMA: Policy-Reduced Integrity Measurement Architecture. In SACMAT '06: Proceedings of the eleventh ACM Symposium on Access Control Models and Technologies, pages 19--28, New York, NY, USA, 2006. ACM Press.
    [9]
    C. Kruegel and T. Toth. Using decision trees to improve signature-based intrusion detection. In Recent Advances in Intrusion Detection, pages 173--191. Springer, 2003.
    [10]
    Peter A. Loscocco, Perry W. Wilson, J. Aaron Pendergrass, and C. Durward McDonell. Linux Kernel Integrity Measurement Using Contextual Inspection. In STC '07: Proceedings of the 2007 ACM Workshop on Scalable Trusted Computing, pages 21--29, New York, NY, USA, 2007. ACM.
    [11]
    J. M. McCune, B. J. Parno, A. Perrig, M. K. Reiter, and H. Isozaki. Flicker: An execution infrastructure for TCB minimization. In Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer Systems 2008, pages 315--328. ACM, 2008.
    [12]
    B. Mehdi, F. Ahmed, S. A. Khayyam, and M. Farooq. Towards a Theory of Generalizing System Call Representation For In-Execution Malware Detection. In ICC'10: Proceedings of the IEEE International Conference on Communications, 2010.
    [13]
    D. Mutz, W. Robertson, G. Vigna, and R. Kemmerer. Exploiting execution context for the detection of anomalous system calls. In Recent Advances in Intrusion Detection (RAID'07), pages 1--20. Springer, 2007.
    [14]
    M. Nauman, S. Khan, X. Zhang, and J. P. Seifert. Beyond kernel-level Integrity Measurement: Enabling Remote Attestation for the Android Platform. In Trust and Trustworthy Computing, pages 1--15. Springer, 2010.
    [15]
    Reiner Sailer, Xiaolan Zhang, Trent Jaeger, and Leendert van Doorn. Design and Implementation of a TCG-based Integrity Measurement Architecture. In SSYM'04: Proceedings of the 13th conference on USENIX Security Symposium, 2004.
    [16]
    H. Shacham. The Geometry of Innocent Flesh on the Bone: Return-into-libc without Function Calls (on the x86). In Proceedings of the 14th ACM conference on Computer and Communications Security (CCS'08), pages 552--561. ACM New York, NY, USA, 2007.
    [17]
    TCG. TCG Specification Architecture Overview v1.2, page 11--12. Technical report, Trusted Computing Group, April 2004.
    [18]
    TCG. Trusted Computing Group, 2010. http://www.trustedcomputinggroup.org/.
    [19]
    University of New Mexico. Computer Immune Systems -- Datasets, Accessed May, 2010. Available at: http://www.cs.unm.edu/~immsec/systemcalls.htm.
    [20]
    W. O. Wilson, J. Feyereisl, and U. Aickelin. Detecting Motifs in System Call Sequences. In 8th international workshop on Information security applications, page 157. Springer, 2007.

    Cited By

    View all
    • (2020)Realizing Macro Based Technique for Behavioral Attestation on Remote PlatformIntelligent Systems and Applications10.1007/978-3-030-55180-3_10(132-144)Online publication date: 25-Aug-2020
    • (2018)Ensemble Prediction Algorithm of Anomaly Monitoring Based on Big Data Analysis Platform of Open-Pit Mine SlopeComplexity10.1155/2018/10487562018Online publication date: 1-Jan-2018
    • (2015)Towards Secure Instance Migration in the Cloud2015 International Conference on Cloud Computing (ICCC)10.1109/CLOUDCOMP.2015.7149664(1-6)Online publication date: Apr-2015

    Index Terms

    1. A sense of others: behavioral attestation of UNIX processes on remote platforms

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Conferences
        ICUIMC '12: Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication
        February 2012
        852 pages
        ISBN:9781450311724
        DOI:10.1145/2184751
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Sponsors

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 20 February 2012

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. dynamic behavior
        2. intrusion detection system
        3. remote attestation
        4. security
        5. trusted computing

        Qualifiers

        • Research-article

        Conference

        ICUIMC '12
        Sponsor:

        Acceptance Rates

        Overall Acceptance Rate 251 of 941 submissions, 27%

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)1
        • Downloads (Last 6 weeks)0

        Other Metrics

        Citations

        Cited By

        View all
        • (2020)Realizing Macro Based Technique for Behavioral Attestation on Remote PlatformIntelligent Systems and Applications10.1007/978-3-030-55180-3_10(132-144)Online publication date: 25-Aug-2020
        • (2018)Ensemble Prediction Algorithm of Anomaly Monitoring Based on Big Data Analysis Platform of Open-Pit Mine SlopeComplexity10.1155/2018/10487562018Online publication date: 1-Jan-2018
        • (2015)Towards Secure Instance Migration in the Cloud2015 International Conference on Cloud Computing (ICCC)10.1109/CLOUDCOMP.2015.7149664(1-6)Online publication date: Apr-2015

        View Options

        Get Access

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media