A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Access Control for Binary Integrity Protection using Ethereum
2019
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies - SACMAT '19
The integrity of executable binaries is essential to the security of any device that runs them. At best, a manipulated binary can leave the system in question open to attack, and at worst, it can compromise the entire system by itself. In recent years, supply-chain attacks have demonstrated that binaries can even be compromised unbeknownst to their creators. This, in turn, leads to the dissemination of supposedly valid binaries that need to be revoked later. In this paper, we present and
doi:10.1145/3322431.3325108
dblp:conf/sacmat/StengeleBBH19
fatcat:ya6e2puhljgbziollfvbwcviwu