2011 44th Hawaii International Conference on System Sciences 2011
DOI: 10.1109/hicss.2011.500
|View full text |Cite
|
Sign up to set email alerts
|

XTRec: Secure Real-Time Execution Trace Recording on Commodity Platforms

Abstract: We propose XTRec, a primitive that can record the instruction-level execution trace of a commodity computing system. Our primitive is resilient to compromise to provide integrity of the recorded execution trace. We implement XTRec on the AMD platform running the Windows OS. The only software component that is trusted in the system during runtime is XTRec itself, which contains only 2,195 lines of code permitting manual audits to ensure security and safety. We use XTRec to show whether a particular code has bee… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
15
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 24 publications
(15 citation statements)
references
References 17 publications
0
15
0
Order By: Relevance
“…In [43], researchers proposed a primitive that provides the integrity of execution trace. It works on instruction-level execution traces.…”
Section: Related Workmentioning
confidence: 99%
“…In [43], researchers proposed a primitive that provides the integrity of execution trace. It works on instruction-level execution traces.…”
Section: Related Workmentioning
confidence: 99%
“…By following these change-of-flow instructions, it is quite easy to generate a complete program flow with the help of additional offline binary disassembly at the decoding phase. Dedicated hardware blocks in the Intel architecture, such as Last Branch Record, Branch Trace Store [15], and more recently Intel Processor Trace (PT) follow this approach. A detailed study of hardwareassisted tracing and profiling with Intel PT has been recently presented in [12].…”
Section: Related Workmentioning
confidence: 99%
“…TrustVisor [7] and Lockdown [2] are fully functional, and their code sizes are precise. The development of HyperDbg [8], XTRec [6] and SecVisor [10] is sufficiently advanced to enable estimation of their final sizes via manual inspection of their existing sources and differentiation between the hypervisor core and hypapp-specific logic. Figure 6 shows that the XMHF core forms 48% of a hypapp's TCB, on average.…”
Section: A Xmhf Tcb and Case Studies With Hypappsmentioning
confidence: 99%
“…These systems are designed to provide interesting security and functional properties including secrecy of security sensitive application code and data [7], trusted user and application interfaces [2], [4], [13], application integrity and privacy [3], [5], [10], [11], [17], debugging support [8], malware analysis, detection and runtime monitoring [6], [9], [14]- [16] and trustworthy resource accounting [1]. A majority of these hypervisor-based solutions are designed and written from scratch with the primary goal of achieving a low Trusted Computing Base (TCB) while providing a specific security property and functionality in the context of an operating system or another (more traditional) hypervisor [2]- [10].…”
Section: Introductionmentioning
confidence: 99%