Resilient Authenticated Execution of Critical Applications in Untrusted Environments


Modern computer systems are built on a foundation of software components from a variety of vendors. While critical applications may undergo extensive testing and evaluation procedures, the heterogeneity of software sources threatens the integrity of the execution environment for these trusted programs. For instance, if an attacker can combine an application exploit with a privilege escalation vulnerability, the operating system (OS) can become corrupted. Alternatively, a malicious or faulty device driver running with kernel privileges could threaten the application. While the importance of ensuring application integrity has been studied in prior work, proposed solutions immediately terminate the application once corruption is detected. Although, this approach is sufficient for some cases, it is undesirable for many critical applications. In order to overcome this shortcoming, we have explored techniques for leveraging a trusted virtual machine monitor (VMM) to observe the application and potentially repair damage that occurs. In this paper, we describe our system design, which leverages efficient coding and authentication schemes, and we present the details of our prototype implementation to quantify the overhead of our approach. Our work shows that it is feasible to build a resilient execution environment, even in the presence of a corrupted OS kernel, with a reasonable amount of storage and performance overhead.

Did you like this research project?

To get this research project Guidelines, Training and Code... Click Here

PROJECT TITLE :Double Error Cellular Automata-Based Error Correction with Skip-mode Compact Syndrome Coding for Resilient PUF Design - 2018ABSTRACT:Physical Unclonable Functions (PUFs) gift an enticing security primitive thanks
PROJECT TITLE : Strong Key-Exposure Resilient Auditing for Secure Cloud Storage - 2017 ABSTRACT: Key exposure is one serious security drawback for cloud storage auditing. In order to deal with this downside, cloud storage auditing
PROJECT TITLE : Error Resilient and Energy Efficient MRF Message-Passing-Based Stereo Matching - 2016 ABSTRACT: Message-passing-based inference algorithms have immense importance in real-world applications. In this paper, error
PROJECT TITLE :Jamming Resilient Communication Using MIMO Interference CancellationABSTRACT:Jamming attack is a serious threat to the wireless communications. Reactive jamming maximizes the attack efficiency by jamming only when
PROJECT TITLE :A Resilient Framework for Fault-Tolerant Operation of Modular Multilevel ConvertersABSTRACT:This paper presents a resilient framework for fault-tolerant operation in modular multilevel converters (MMCs) to facilitate

Ready to Complete Your Academic MTech Project Work In Affordable Price ?

Project Enquiry