Abstract
With the widespread use of the distributed systems comes the need to secure such systems against a wide variety of threats. Recent security mechanisms are grossly inadequate in authenticating the program executions at the clients or servers, as the clients, servers and the executing programs themselves can be compromised after the clients and servers pass the authentication phase. This paper presents a generic framework for authenticating remote executions on a potentially untrusted remote server - essentially validating that what is executed at the server on behalf of the client is actually the intended program. Details of a prototype Linux implementation are also described, along with some optimization techniques for reducing the run-time overhead of the proposed scheme. The performance overhead of our technique varies generally from 7% to 24% for most benchmarks, as seen from the actual remote execution of SPEC benchmarks.
| Original language | English |
|---|---|
| Article number | 4721580 |
| Pages (from-to) | 453-462 |
| Number of pages | 10 |
| Journal | Proceedings - Annual Computer Security Applications Conference, ACSAC |
| DOIs | |
| State | Published - 2008 |
| Event | 24th Annual Computer Security Applications Conference, ACSAC 2008 - Anaheim, CA, United States Duration: Dec 8 2008 → Dec 12 2008 |
Keywords
- Computer security
- Signature-based authentication
- Trusted computing
Fingerprint
Dive into the research topics of 'DARE: A framework for dynamic authentication of remote executions'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver