Nothing Special   »   [go: up one dir, main page]

skip to main content
article

ASM: application security monitor

Published: 01 December 2005 Publication History

Abstract

Our Application Security Monitor (ASM) is a run-time monitor that dynamically collects execution-related data. ASM is part of a security framework that will allow us to explore different security policies aimed at identifying malicious behavior such as Trojan horses and backdoors.In this paper, we show what type of data ASM can collect and illustrate how this data can be used to enforce a security policy. Using ASM we are able to explore different tradeoffs between security and performance.

References

[1]
D. E. Denning. A lattice model of secure information flow. Commun. ACM, 19(5):236--243, 1976.
[2]
G. Edjlali, A. Acharya, and V. Chaudhary. History-based access control for mobile code. In CCS '98: Proceedings of the 5th ACM conference on Computer and communications security, pages 38--48, 1998.
[3]
D. Gao, M. K. Reiter, and D. Song. On gray-box program tracking for anomaly detection. In Proceedings of the 13th USENIX Security Symposium, pages 103--118, San Diego, CA, USA, Aug. 9--13 2004.
[4]
I. Goldberg, D. Wagner, R. Thomas, and E. A. Brewer. A secure environment for untrusted helper applications (confining the wily hacker). In Proceedings of the 6th Usenix Security Symposium, San Jose, CA, USA, 1996.
[5]
LURHQ Threat Intelligence Group. Lurhq. http://www.lurhq.com/phatbot.html.
[6]
V. Kiriansky, D. Bruening, and S. Amarasinghe. Secure execution via program shepherding. In Security '02: Proceeding of the 11th USENIX Security Symposium, San Francisco, August 2002.
[7]
C. Ko, T. Fraser, L. Badger, and D. Kilpatrick. Detecting and countering system intrusions using software wrappers. In Proceedings of the USENIX Security Conference, pages 145--156, Jan 2000.
[8]
A. P. Kosoresow and S. A. Hofmeyr. Intrusion detection via system call traces. IEEE Softw., 14(5):35--42, 1997.
[9]
C. K. Luk, R. Cohn, R. Muth, H. Patil, A. Klauser, G. Lowney, S. Wallace, V. J. Reddi, and K. Hazelwood. Pin: Building customized program analysis tools with dynamic instrumentation. In Programming Language Design and Implementation (PLDI), Jun. 2005. Chicago, IL.
[10]
A. C. Myers. Jflow: practical mostly-static information flow control. In POPL '99: Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, pages 228--241, New York, NY, USA, 1999. ACM Press.
[11]
Bruce Schneier. Attack trends 2004 and 2005. In ACM Queue vol. 3, no. 5. ACM, Jun. 2005. http://acmqueue.com/.
[12]
K. Scott and J. Davidson. Safe virtual execution using software dynamic translation. In ACSAC '02: Proceedings of the 18th Annual Computer Security Applications Conference, page 209, Washington, DC, USA, 2002. IEEE Computer Society.
[13]
G. E. Suh, J. W. Lee, D. Zhang, and S. Devadas. Secure program execution via dynamic information flow tracking. In ASPLOS-XI: Proceedings of the 11th international conference on Architectural support for programming languages and operating systems, pages 85--96, New York, NY, USA, 2004. ACM Press.
[14]
United States Computer Emergency Readiness Team. Us-cert. http://www.us-cert.gov/.
[15]
Carnegie Mellon University. Cert. http://www.cert.org/.
[16]
N. Vachharajani, M. J. Bridges, J. Chang, R. Rangan, G. Ottoni, J. A. Blome, G. A. Reis, M. Vachharajani, and D. I. August. Rifle: An architectural framework for user-centric information-flow security. In MICRO 37: Proceedings of the 37th annual International Symposium on Microarchitecture, pages 243--254, Washington, DC, USA, 2004. IEEE Computer Society.

Cited By

View all
  • (2010)Mining Bluetooth Attacks in Smart PhonesNetworked Digital Technologies10.1007/978-3-642-14292-5_26(241-253)Online publication date: 2010
  • (2007)A multi-core security architecture based on EFIProceedings of the 2007 OTM confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part II10.5555/1784707.1784760(1675-1687)Online publication date: 25-Nov-2007
  • (2007)A Multi-core Security Architecture Based on EFIOn the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS10.1007/978-3-540-76843-2_39(1675-1687)Online publication date: 2007

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM SIGARCH Computer Architecture News
ACM SIGARCH Computer Architecture News  Volume 33, Issue 5
Special issue on the 2005 workshop on binary instrumentation and application
December 2005
93 pages
ISSN:0163-5964
DOI:10.1145/1127577
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 December 2005
Published in SIGARCH Volume 33, Issue 5

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 02 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2010)Mining Bluetooth Attacks in Smart PhonesNetworked Digital Technologies10.1007/978-3-642-14292-5_26(241-253)Online publication date: 2010
  • (2007)A multi-core security architecture based on EFIProceedings of the 2007 OTM confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part II10.5555/1784707.1784760(1675-1687)Online publication date: 25-Nov-2007
  • (2007)A Multi-core Security Architecture Based on EFIOn the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS10.1007/978-3-540-76843-2_39(1675-1687)Online publication date: 2007

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media