System and Method for mitigating TOC/TOU attacks in a cloud computing enviroment

A computer system, method, and computer program product for mitigating TOCTOU attacks, which includes: as processor requesting measurements representing operation of a first process on a host that is untrusted and based on the requesting, obtaining the measurements, which include a checksum that is...

Full description

Saved in:
Bibliographic Details
Main Authors Chiang C. Jason, Kubota Ayumu, Ghosh Abhrajit, Sapello Angelo, Poylisher Alexander, Matsunaka Takashi
Format Patent
LanguageEnglish
Published 16.05.2017
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:A computer system, method, and computer program product for mitigating TOCTOU attacks, which includes: as processor requesting measurements representing operation of a first process on a host that is untrusted and based on the requesting, obtaining the measurements, which include a checksum that is a result of a second process executing checksum code to verify at least one last branch record on the host. A processor also determined, based on the measurements, whether the first process was compromised.
Bibliography:Application Number: US201514743774