Abstract
In this paper, we propose a cross verification mechanism for secure execution and dynamic component loading. Our mechanism is based on a combination of code signing and same-origin policy, and it blocks several types of attacks from drive-by download attacks to malicious component loadings such as DLL hijacking, DLL side-loading, binary hijacking, typical DLL injection and loading of newly installed malware components, even when malicious components have valid digital signatures. Considering modern malware often uses stolen private keys to sign its binaries and bypass code signing mechanism, we believe the proposed mechanism can significantly improve the security of modern computing platforms. In addition, the proposed mechanism protects proprietary software components so that unauthorised use of such components cannot occur. We have implemented a prototype for Microsoft Windows 7 and XP SP3, and evaluated application execution and dynamic component loading behaviour under our security mechanism. The proposed mechanism is general, and can be applied to other major computing platforms including Android, Linux and Mac OS X.
| Original language | English |
|---|---|
| Title of host publication | Proceedings - 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2015 |
| Place of Publication | Piscataway, NJ |
| Publisher | Institute of Electrical and Electronics Engineers (IEEE) |
| Pages | 113-124 |
| Number of pages | 12 |
| ISBN (Electronic) | 9781479986293, 9781479986286 |
| ISBN (Print) | 9781479986309 |
| DOIs | |
| Publication status | Published - 14 Sept 2015 |
| Event | 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2015 - Rio de Janeiro, Brazil Duration: 22 Jun 2015 → 25 Jun 2015 |
Other
| Other | 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2015 |
|---|---|
| Country/Territory | Brazil |
| City | Rio de Janeiro |
| Period | 22/06/15 → 25/06/15 |
Fingerprint
Dive into the research topics of 'Secure dynamic software loading and execution using cross component verification'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver