%0 Conference Proceedings %T Simple and Practical Integrity Models for Binaries and Files %+ Huawei Technologies [Shanghaï] %+ National University of Singapore (NUS) %A Wu, Yongzheng %A Yap, Roland, C. %Z Part 2: Full Papers %< avec comité de lecture %( IFIP Advances in Information and Communication Technology %B 9th IFIP International Conference on Trust Management (TM) %C Hamburg, Germany %Y Christian Damsgaard Jensen %Y Stephen Marsh %Y Theo Dimitrakos %Y Yuko Murayama %3 Trust Management IX %V AICT-454 %P 30-46 %8 2015-05-26 %D 2015 %R 10.1007/978-3-319-18491-3_3 %Z Computer Science [cs]Conference papers %X Software environments typically depend on implicit sharing of binaries where binaries are created, loaded/executed and updated dynamically which we call the binary lifecycle. Windows is one example where many attacks exploit vulnerabilities in the binary lifecycle of software. In this paper, we propose a family of binary integrity models with a simple and easy to use trust model, to help protect against such attacks. We implement a prototype in Windows which protects against a variety of common binary attacks. Our models are easy to use while maintaining existing software compatibility, i.e. work with the implicit binary lifecycle requirements of the software and assumptions on binary sharing. We also propose a conservative extension to protect critical non-binary files. %G English %Z TC 11 %Z WG 11.11 %2 https://inria.hal.science/hal-01416206/document %2 https://inria.hal.science/hal-01416206/file/337890_1_En_3_Chapter.pdf %L hal-01416206 %U https://inria.hal.science/hal-01416206 %~ IFIP %~ IFIP-AICT %~ IFIP-TC %~ IFIP-TC11 %~ IFIP-TM %~ IFIP-WG11-11 %~ IFIP-AICT-454