×

System and Method for mitigating TOC/TOU attacks in a cloud computing enviroment

  • US 9,654,499 B2
  • Filed: 06/18/2015
  • Issued: 05/16/2017
  • Est. Priority Date: 06/20/2014
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method for mitigating TOCTOU attacks comprising:

  • performing, by a processor of a trusted host communicatively coupled to an untrusted host via a communications connection, a run-time integrity verification of a first process executed by the processor of the untrusted host to determine that a first process executed on the untrusted host was launched from a pre-defined location and executed from beginning to end, wherein the untrusted host comprises multiple processors, the performing comprising;

    requesting, by the processor of the trusted host, from a first processor of the multiple processors of the untrusted host, measurements representing operation of a first process on an untrusted host;

    based on the requesting, obtaining, by the processor of the trusted host, the measurements, wherein the measurements comprise a checksum that is a result of a second process executing checksum code on the untrusted host to verify, during run-time of the first process, at least one pseudo-randomly chosen last branch record on the untrusted host; and

    determining, by the processor, based on the measurements, whether the first process was compromised by utilizing the pseudo-randomly chosen last branch record to verify that the first process was launched from a pre-defined location and executed from beginning to end by the untrusted host.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×