A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Dynamic integrity measurement and attestation
2009
Proceedings of the 2009 ACM workshop on Scalable trusted computing - STC '09
Despite the many efforts made in recent years to mitigate runtime attacks such as stack and heap based buffer overflows, these attacks are still a common security concern in today's computing platforms. Attackers have even found new ways to enforce runtime attacks including use of a technique called return-oriented programming. Trusted Computing provides mechanisms to verify the integrity of all executable content in an operating system. But they only provide integrity at load-time and are not
doi:10.1145/1655108.1655117
dblp:conf/ccs/DaviSW09
fatcat:4bmgql34zrhwhawj4wk5epth5i