@inproceedings{93c311fcbd3e45e1ad57dd89894964b9,
title = "Enforcing executing-implies-verified with the integrity-aware processor",
abstract = "Malware often injects and executes new code to infect hypervisors, OSs and applications. Such malware infections can be prevented by checking all code against a whitelist before permitting it to execute. The eXecuting Implies Verified Enforcer (XIVE) is a distributed system in which a kernel on each target system consults a server called the approver to verify code on-demand. We propose a new hardware mechanism to isolate the XIVE kernel from the target host. The Integrity-Aware Processor (IAP) that embodies this mechanism is based on a SPARC soft-core for an FPGA and provides high performance, high compatibility with target systems and flexible invocation options to ensure visibility into the target system. This facilitates the development of a very small trusted computing base.",
author = "Michael LeMay and Gunter, {Carl A.}",
note = "Funding Information: Acknowledgments. This work was supported in part by DOE DE-OE0000097, HHS 90TR0003-01, NSF CNS 09-64392, NSF CNS 09-17218, NSF CNS 07-16626, NSF CNS 07-16421, NSF CNS 05-24695, and grants from the MacArthur Foundation, and Lockheed Martin Corporation. The views expressed are those of the authors only. We thank Samuel T. King and the anonymous reviewers for their helpful feedback. We measured lines of code using David A. Wheeler{\textquoteright}s {\textquoteright}SLOC-Count{\textquoteright}. Funding Information: This work was supported in part by DOE DE-OE0000097, HHS 90TR0003-01, NSF CNS 09-64392, NSF CNS 09-17218, NSF CNS 07-16626, NSF CNS 07-16421, NSF CNS 05-24695, and grants from the MacArthur Foundation, and Lockheed Martin Corporation. The views expressed are those of the authors only. We thank Samuel T. King and the anonymous reviewers for their helpful feedback. We measured lines of code using David A. Wheeler{\textquoteright}s {\textquoteright}SLOC-Count{\textquoteright}.",
year = "2011",
doi = "10.1007/978-3-642-21599-5_15",
language = "English (US)",
isbn = "9783642215988",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer",
pages = "202--216",
booktitle = "Trust and Trustworthy Computing - 4th International Conference, TRUST 2011, Proceedings",
address = "Germany",
}