We present Conqueror, a software-based attestation scheme for tamper-proof code execution on untrusted legacy systems. Beside providing load-time attestation of a piece of code, Conqueror also ensures run-time integrity. Conqueror constitutes a valid alternative to trusted computing platforms, for systems lacking specialized hardware for attestation. We implemented a prototype, specific for the Intel x86 architecture, and evaluated the proposed scheme. Our evaluation showed that, compared to competitors, Conqueror is resistant to static and dynamic attacks and that our scheme represents an important building block for realizing new security systems
Self-checking software tamper resistance mechanisms employing checksums, including ad-vanced systems...
Anti-tampering is a form of software protection conceived to detect and avoid the execution of tampe...
Remote attestation is a security service that is typically realized by an interactive challenge-resp...
Remote attestation is an important security service that allows a trusted party (verifier) to verify...
We propose a primitive, called Pioneer, as a rst step towards veriable code execution on untrusted l...
An important security challenge is to protect the execution of security-sensitive code on legacy sys...
As the complexity of current software systems increases, we see a correlative increase in the number...
AbstractA lot of progress has been made to secure network communication, e.g., through the use of cr...
Security of embedded devices is a timely and important issue, due to their proliferation into numero...
Anti-tampering is a form of software protection conceived to detect and avoid the execution of tampe...
AbstractA lot of progress has been made to secure network communication, e.g., through the use of cr...
Remote attestation is an important security service that allows a trusted party (verifier) to verify...
Software attestation has become a popular and challenging research topic at many established securit...
In recent years, many have suggested to apply encryption in the domain of software protection agains...
Security of embedded devices is a timely and important issue, due to the proliferation of these devi...
Self-checking software tamper resistance mechanisms employing checksums, including ad-vanced systems...
Anti-tampering is a form of software protection conceived to detect and avoid the execution of tampe...
Remote attestation is a security service that is typically realized by an interactive challenge-resp...
Remote attestation is an important security service that allows a trusted party (verifier) to verify...
We propose a primitive, called Pioneer, as a rst step towards veriable code execution on untrusted l...
An important security challenge is to protect the execution of security-sensitive code on legacy sys...
As the complexity of current software systems increases, we see a correlative increase in the number...
AbstractA lot of progress has been made to secure network communication, e.g., through the use of cr...
Security of embedded devices is a timely and important issue, due to their proliferation into numero...
Anti-tampering is a form of software protection conceived to detect and avoid the execution of tampe...
AbstractA lot of progress has been made to secure network communication, e.g., through the use of cr...
Remote attestation is an important security service that allows a trusted party (verifier) to verify...
Software attestation has become a popular and challenging research topic at many established securit...
In recent years, many have suggested to apply encryption in the domain of software protection agains...
Security of embedded devices is a timely and important issue, due to the proliferation of these devi...
Self-checking software tamper resistance mechanisms employing checksums, including ad-vanced systems...
Anti-tampering is a form of software protection conceived to detect and avoid the execution of tampe...
Remote attestation is a security service that is typically realized by an interactive challenge-resp...