System and Method for mitigating TOC/TOU attacks in a cloud computing enviroment
A computer system, method, and computer program product for mitigating TOCTOU attacks, which includes: as processor requesting measurements representing operation of a first process on a host that is untrusted and based on the requesting, obtaining the measurements, which include a checksum that is...
Saved in:
Main Authors | , , , , , |
---|---|
Format | Patent |
Language | English |
Published |
16.05.2017
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | A computer system, method, and computer program product for mitigating TOCTOU attacks, which includes: as processor requesting measurements representing operation of a first process on a host that is untrusted and based on the requesting, obtaining the measurements, which include a checksum that is a result of a second process executing checksum code to verify at least one last branch record on the host. A processor also determined, based on the measurements, whether the first process was compromised. |
---|---|
Bibliography: | Application Number: US201514743774 |