Access Restriction

Author van Doorn, Leendert ♦ Seshadri, Arvind ♦ Khosla, Pradeep ♦ Perrig, Adrian ♦ Shi, Elaine ♦ Luk, Mark
Source ACM Digital Library
Content type Text
Publisher Association for Computing Machinery (ACM)
File Format PDF
Language English
Subject Domain (in DDC) Computer science, information & general works ♦ Data processing & computer science
Subject Keyword Software-based code attestation ♦ Self-check-summing code ♦ Dynamic root of trust ♦ Rootkit detection ♦ Verifiable code execution
Abstract We propose a primitive, called Pioneer, as a first step towards verifiable code execution on untrusted legacy hosts. Pioneer does not require any hardware support such as secure co-processors or CPU-architecture extensions. We implement Pioneer on an Intel Pentium IV Xeon processor. Pioneer can be used as a basic building block to build security systems. We demonstrate this by building a kernel rootkit detector.
Description Affiliation: IBM (van Doorn, Leendert) || CMU/CyLab (Seshadri, Arvind; Luk, Mark; Shi, Elaine; Perrig, Adrian; Khosla, Pradeep)
Age Range 18 to 22 years ♦ above 22 year
Educational Use Research
Education Level UG and PG
Learning Resource Type Article
Publisher Date 1975-04-01
Publisher Place New York
Journal ACM SIGOPS Operating Systems Review (OPSR)
Volume Number 39
Issue Number 5
Page Count 16
Starting Page 1
Ending Page 16

Open content in new tab

   Open content in new tab
Source: ACM Digital Library