Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Integrity Verification of Applications on RADIUM Architecture

View through CrossRef
Trusted Computing capability has become ubiquitous these days, and it is being widely deployed into consumer devices as well as enterprise platforms. As the number of threats is increasing at an exponential rate, it is becoming a daunting task to secure the systems against them. In this context, the software integrity measurement at runtime with the support of trusted platforms can be a better security strategy. Trusted Computing devices like TPM secure the evidence of a breach or an attack. These devices remain tamper proof if the hardware platform is physically secured. This type of trusted security is crucial for forensic analysis in the aftermath of a breach. The advantages of trusted platforms can be further leveraged if they can be used wisely. RADIUM (Race-free on-demand Integrity Measurement Architecture) is one such architecture, which is built on the strength of TPM. RADIUM provides an asynchronous root of trust to overcome the TOC condition of DRTM. Even though the underlying architecture is trusted, attacks can still compromise applications during runtime by exploiting their vulnerabilities. I propose an application-level integrity measurement solution that fits into RADIUM, to expand the trusted computing capability to the application layer. This is based on the concept of program invariants that can be used to learn the correct behavior of an application. I used Daikon, a tool to obtain dynamic likely invariants, and developed a method of observing these properties at runtime to verify the integrity. The integrity measurement component was implemented as a Python module on top of Volatility, a virtual machine introspection tool. My approach is a first step towards integrity attestation, using hypervisor-based introspection on RADIUM and a proof of concept of application-level measurement capability.
University of North Texas Libraries
Title: Integrity Verification of Applications on RADIUM Architecture
Description:
Trusted Computing capability has become ubiquitous these days, and it is being widely deployed into consumer devices as well as enterprise platforms.
As the number of threats is increasing at an exponential rate, it is becoming a daunting task to secure the systems against them.
In this context, the software integrity measurement at runtime with the support of trusted platforms can be a better security strategy.
Trusted Computing devices like TPM secure the evidence of a breach or an attack.
These devices remain tamper proof if the hardware platform is physically secured.
This type of trusted security is crucial for forensic analysis in the aftermath of a breach.
The advantages of trusted platforms can be further leveraged if they can be used wisely.
RADIUM (Race-free on-demand Integrity Measurement Architecture) is one such architecture, which is built on the strength of TPM.
RADIUM provides an asynchronous root of trust to overcome the TOC condition of DRTM.
Even though the underlying architecture is trusted, attacks can still compromise applications during runtime by exploiting their vulnerabilities.
I propose an application-level integrity measurement solution that fits into RADIUM, to expand the trusted computing capability to the application layer.
This is based on the concept of program invariants that can be used to learn the correct behavior of an application.
I used Daikon, a tool to obtain dynamic likely invariants, and developed a method of observing these properties at runtime to verify the integrity.
The integrity measurement component was implemented as a Python module on top of Volatility, a virtual machine introspection tool.
My approach is a first step towards integrity attestation, using hypervisor-based introspection on RADIUM and a proof of concept of application-level measurement capability.

Related Results

Developing guidelines for research institutions
Developing guidelines for research institutions
As introduced in Chapter 1, in this thesis, I developed guidelines to research institutions on how to foster research integrity. I did this by exploring how research institutions c...
Maintaining Web Applications Integrity Running on RADIUM
Maintaining Web Applications Integrity Running on RADIUM
Computer security attacks take place due to the presence of vulnerabilities and bugs in software applications. Bugs and vulnerabilities are the result of weak software architecture...
Shenzi 16-Inch Oil Export SCR CVA Verification
Shenzi 16-Inch Oil Export SCR CVA Verification
Abstract In 2006 Enterprise developed a 16-inch oil export system from Shenzi field located in Green Canyon Block 653 in the Gulf of Mexico, approximately 120 nau...
Actualització consistent de bases de dades deductives
Actualització consistent de bases de dades deductives
En aquesta tesi, proposem un nou mètode per a l'actualització consistent de bases de dades deductives. Donada una petició d'actualització, aquest mètode tradueix de forma automàtic...
Platform Verification - Aview From Amember Of Industry
Platform Verification - Aview From Amember Of Industry
ABSTRACT Concerns have been raised in many sectors regarding the safety and reliability of offshore platforms. In this paper, the history of offshore operations a...
Monitoring and treatment of combined radium in Iowa private wells
Monitoring and treatment of combined radium in Iowa private wells
Unregulated private drinking water supplies, especially private wells, are likely to be disproportionately impacted by naturally-occurring radioactive material (NORM), which contam...
The Period of Decay of Radium B and Radium C
The Period of Decay of Radium B and Radium C
Measurements of the saturation currents produced between two parallel plates by a source of radium C of carefully tested purity have been performed by an accurate galvanometer meth...

Back to Top