Title :
Hiding Your Wares: Transparently Retrofitting Memory Confidentiality into Legacy Applications
Author :
Levy, Jacob ; Khan, Bilal
Author_Institution :
John Jay Coll. of Criminal Justice, New York
Abstract :
Memory scanning is a common technique used by malicious programs to read and modify the memory of other programs. Guarding programs against such exploits requires memory encryption, which is presently achievable either by (i) re-writing software to make it encrypt sensitive memory contents, or (ii) employing hardware-based solutions. These approaches are complicated, costly, and present their own vulnerabilities. In this paper, we describe new secure software technology that enables users to transparently add memory encryption to their existing software, without requiring users to invest in costly encryption hardware or requiring programmers to undertake complicated software redesign/redeployment. The memory encryption and transparent aegis library (METAL) functions as a shim library, allowing legacy applications to transparently enjoy an assurance of memory confidentiality and integrity. The proposed solution is tunable in terms of trade-offs between security and computational overhead. We describe the design of the library and evaluate its benefits and performance trade-offs.
Keywords :
invasive software; software libraries; software maintenance; storage management; legacy application; malicious program; memory encryption; memory integrity; memory scanning; shim library; software security; transparent aegis library; transparently retrofitting memory confidentiality; Application software; Communications Society; Computer science; Cryptography; Intrusion detection; Kernel; Mathematics; Programming profession; Read-write memory; Software libraries;
Conference_Titel :
Communications, 2007. ICC '07. IEEE International Conference on
Conference_Location :
Glasgow
Print_ISBN :
1-4244-0353-7
DOI :
10.1109/ICC.2007.230