DocumentCode :
3244829
Title :
Hiding Your Wares: Transparently Retrofitting Memory Confidentiality into Legacy Applications
Author :
Levy, Jacob ; Khan, Bilal
Author_Institution :
John Jay Coll. of Criminal Justice, New York
fYear :
2007
fDate :
24-28 June 2007
Firstpage :
1368
Lastpage :
1372
Abstract :
Memory scanning is a common technique used by malicious programs to read and modify the memory of other programs. Guarding programs against such exploits requires memory encryption, which is presently achievable either by (i) re-writing software to make it encrypt sensitive memory contents, or (ii) employing hardware-based solutions. These approaches are complicated, costly, and present their own vulnerabilities. In this paper, we describe new secure software technology that enables users to transparently add memory encryption to their existing software, without requiring users to invest in costly encryption hardware or requiring programmers to undertake complicated software redesign/redeployment. The memory encryption and transparent aegis library (METAL) functions as a shim library, allowing legacy applications to transparently enjoy an assurance of memory confidentiality and integrity. The proposed solution is tunable in terms of trade-offs between security and computational overhead. We describe the design of the library and evaluate its benefits and performance trade-offs.
Keywords :
invasive software; software libraries; software maintenance; storage management; legacy application; malicious program; memory encryption; memory integrity; memory scanning; shim library; software security; transparent aegis library; transparently retrofitting memory confidentiality; Application software; Communications Society; Computer science; Cryptography; Intrusion detection; Kernel; Mathematics; Programming profession; Read-write memory; Software libraries;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Communications, 2007. ICC '07. IEEE International Conference on
Conference_Location :
Glasgow
Print_ISBN :
1-4244-0353-7
Type :
conf
DOI :
10.1109/ICC.2007.230
Filename :
4288901
Link To Document :
بازگشت