Proceedings of the 24th ACM Symposium on Access Control Models and Technologies 2019
DOI: 10.1145/3322431.3325108
|View full text |Cite
|
Sign up to set email alerts
|

Access Control for Binary Integrity Protection using Ethereum

Abstract: The integrity of executable binaries is essential to the security of any device that runs them. At best, a manipulated binary can leave the system in question open to attack, and at worst, it can compromise the entire system by itself. In recent years, supply-chain attacks have demonstrated that binaries can even be compromised unbeknownst to their creators. This, in turn, leads to the dissemination of supposedly valid binaries that need to be revoked later. In this paper, we present and evaluate a concept for… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
1

Relationship

3
5

Authors

Journals

citations
Cited by 13 publications
(14 citation statements)
references
References 5 publications
0
14
0
Order By: Relevance
“…The targeted use cases address mainly the operation of IoT devices, and proposed interactions with a smart contract are mostly described at conceptual level relying on external attestation protocols or manual inspection. The work is therefore, orthogonal to our attack context, but as well as [39] it strengthens the common assumption of using blockchain, and in particular Ethereum, for its integrity guarantees.…”
Section: Related Workmentioning
confidence: 79%
See 1 more Smart Citation
“…The targeted use cases address mainly the operation of IoT devices, and proposed interactions with a smart contract are mostly described at conceptual level relying on external attestation protocols or manual inspection. The work is therefore, orthogonal to our attack context, but as well as [39] it strengthens the common assumption of using blockchain, and in particular Ethereum, for its integrity guarantees.…”
Section: Related Workmentioning
confidence: 79%
“…These typically address protecting the integrity of simple binaries in a supply chain, not specifically of an SGX enclave. The most close to our distributed mitigation is the idea presented in [39]. Similar to our approach, a hash digest computed over the binary is stored in a smart contract in the Ethereum blockchain, with the purpose to detect if the binary was tampered.…”
Section: Related Workmentioning
confidence: 99%
“…In previous work [4], a concept was proposed on how the Ethereum blockchain can serve as a middleware to facilitate the publication and revocation of integrity protecting information for software binaries and how the underlying peer-to-peer network can be viewed as a reliable broadcast medium. Smart contracts are used to establish unique and persistent identities for software that can be managed by and transferred between software developers and maintainers.…”
Section: Palinodiamentioning
confidence: 99%
“…The work by Stengele et al [46] adopts a similar approach to ours of using smart contracts to provide software transparency but model it as an access control problem. In their system, each software package is represented with a Root Software Identifier (Root SI) generated by Software Smart Contract issued by a developer.…”
Section: Related Workmentioning
confidence: 99%