TY - GEN
T1 - PRIMA
T2 - 11th ACM Symposium on Access Control Models and Technologies, SACMAT 2006
AU - Jaeger, Trent
AU - Sailer, Reiner
AU - Shankar, Umesh
PY - 2006
Y1 - 2006
N2 - We propose an integrity measurement approach based on information flow integrity, which we call the Policy-Reduced Integrity Measurement Architecture (PRIMA). The recent availability of secure hardware has made it practical for a system to measure its own integrity, such that it can generate an integrity proof for remote parties. Various approaches have been proposed, but most simply measure the loaded code and static data to approximate runtime system integrity. We find that these approaches suffer from two problems: (1) the load-time measurements of code alone do not accurately reflect runtime behaviors, such as the use of untrusted network data, and (2) they are inefficient, requiring all measured entities to be known and fully trusted even if they have no impact on the target application. Classical integrity models are based on information flow, so we design the PRIMA approach to enable measurement of information flow integrity and prove that it achieves these goals. We prove how a remote party can verify useful information flow integrity properties using PRIMA. A PRIMA prototype has been built based on the open-source Linux Integrity Measurement Architecture (IMA) using SELinux policies to provide the information flow.
AB - We propose an integrity measurement approach based on information flow integrity, which we call the Policy-Reduced Integrity Measurement Architecture (PRIMA). The recent availability of secure hardware has made it practical for a system to measure its own integrity, such that it can generate an integrity proof for remote parties. Various approaches have been proposed, but most simply measure the loaded code and static data to approximate runtime system integrity. We find that these approaches suffer from two problems: (1) the load-time measurements of code alone do not accurately reflect runtime behaviors, such as the use of untrusted network data, and (2) they are inefficient, requiring all measured entities to be known and fully trusted even if they have no impact on the target application. Classical integrity models are based on information flow, so we design the PRIMA approach to enable measurement of information flow integrity and prove that it achieves these goals. We prove how a remote party can verify useful information flow integrity properties using PRIMA. A PRIMA prototype has been built based on the open-source Linux Integrity Measurement Architecture (IMA) using SELinux policies to provide the information flow.
UR - http://www.scopus.com/inward/record.url?scp=33748062337&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=33748062337&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:33748062337
SN - 1595933549
SN - 9781595933546
T3 - Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT
SP - 19
EP - 28
BT - SACMAT 2006
Y2 - 7 June 2006 through 9 June 2006
ER -