Proceedings of the 24th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
The grid: blueprint for a new computing infrastructure
The grid: blueprint for a new computing infrastructure
Mimicry attacks on host-based intrusion detection systems
Proceedings of the 9th ACM conference on Computer and communications security
Enabling trusted software integrity
Proceedings of the 10th international conference on Architectural support for programming languages and operating systems
A Technique for Drawing Directed Graphs
IEEE Transactions on Software Engineering
Proceedings of a symposium on Compiler optimization
Intrusion Detection via Static Analysis
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
Stochastic Local Search: Foundations & Applications
Stochastic Local Search: Foundations & Applications
A framework for trusted instruction execution via basic block signature verification
ACM-SE 42 Proceedings of the 42nd annual Southeast regional conference
Using Data-Flow Analysis for Resilience and Result Checking in Peer-To-Peer Computations
DEXA '04 Proceedings of the Database and Expert Systems Applications, 15th International Workshop
Semantics-Aware Malware Detection
SP '05 Proceedings of the 2005 IEEE Symposium on Security and Privacy
Proceedings of the 12th ACM conference on Computer and communications security
Semantic remote attestation: a virtual machine directed approach to trusted computing
VM'04 Proceedings of the 3rd conference on Virtual Machine Research And Technology Symposium - Volume 3
KAAPI: A thread scheduling runtime system for data flow computations on cluster of multi-processors
Proceedings of the 2007 international workshop on Parallel symbolic computation
Proceedings of the 2007 international workshop on Parallel symbolic computation
Flexible Rollback Recovery in Dynamic Heterogeneous Grid Computing
IEEE Transactions on Dependable and Secure Computing
Euro-Par 2008 Workshops - Parallel Processing
CertiCloud: A Novel TPMBbased Approach to Ensure Cloud IaaS Security
CLOUD '11 Proceedings of the 2011 IEEE 4th International Conference on Cloud Computing
Hi-index | 0.00 |
This article proposes a dynamic and flexible signature scheme to verify at runtime the execution of a distributed program. Extending [20], the approach relies on the analysis of a trace that represents such an execution using Control Flow Graph (CFG). This mechanism ensures the detection of flow faults that do not correspond to the CFG, i.e. that tamper the normal run of the application. Most effects of malicious code injection commonly met on distributed computing platforms such as grids are covered by this approach. The execution engine used in our signature scheme is certified with the TPM-based Certification of a Remote Resource (TCRR) protocol [5]. Our approach has been implemented in KAAPI,, a C++ middleware library to execute and schedule fine or medium size grain programs on distributed platforms. The concrete validation on two parallel programs (Fibonacci and NQueens) reveals the scalability of the approach and its relatively low overhead.