Journal of Information Security

Volume 1, Issue 1 (July 2010)

ISSN Print: 2153-1234   ISSN Online: 2153-1242

Google-based Impact Factor: 3.79  Citations  

Micro-Architecture Support for Integrity Measurement on Dynamic Instruction Trace

HTML  Download Download as PDF (Size: 223KB)  PP. 1-10  
DOI: 10.4236/jis.2010.11001    7,046 Downloads   11,820 Views  Citations
Author(s)

Affiliation(s)

.

ABSTRACT

Trusted computing allows attesting remote system’s trustworthiness based on the software stack whose integrity has been measured. However, attacker can corrupt system as well as measurement operation. As a result, nearly all integrity measurement mechanism suffers from the fact that what is measured may not be same as what is executed. To solve this problem, a novel integrity measurement called dynamic instruction trace measurement (DiT) is proposed. For DiT, processor’s instruction cache is modified to stores back instructions to memory. Consequently, it is designed as a assistance to existing integrity measurement by including dynamic instructions trace. We have simulated DiT in a full-fledged system emulator with level-1 cache modified. It can successfully update records at the moment the attestation is required. Overhead in terms of circuit area, power consumption, and access time, is less than 3% for most criterions. And system only introduces less than 2% performance overhead in average.

Share and Cite:

H. Lin and G. Lee, "Micro-Architecture Support for Integrity Measurement on Dynamic Instruction Trace," Journal of Information Security, Vol. 1 No. 1, 2010, pp. 1-10. doi: 10.4236/jis.2010.11001.

Cited by

[1] Human‐centric visual monitoring of multi‐clients system behavior and BiT for trust computing
Security and Communication Networks, 2014
[2] Cyber-Security Analysis in Smart Grid SCADA Systems: A Game Theoretic Approach
2013
[3] TCG 下可信度量机制与模型分析
哈尔滨工业大学学报, 2013
[4] 软件哨兵安全动态检测模型的研究与实现
计算机应用研究, 2012
[5] Visual monitoring system of multi-hosts behavior for trustworthiness with mobile cloud
2012
[6] Study and implementation of software guards' security dynamic testing model
Jisuanji Yingyong Yanjiu, 2012
[7] Visual Monitoring System of Multi-Hosts Behavior for Trustworthiness with Mobile Cloud.
JIPS, 2012
[8] Development of m-TMS for trusted computing in mobile cloud
Advances in Grid and Pervasive Computing. Springer Berlin Heidelberg, 2012
[9] Study of trustworthiness measurement and kernel modules accessing address space of any process
Information Computing and Applications, 2012

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.