Skip to main content
Erschienen in: International Journal of Information Security 6/2017

22.12.2016 | Regular Contribution

Development of dynamic protection against timing channels

verfasst von: Shahrzad Kananizadeh, Kirill Kononenko

Erschienen in: International Journal of Information Security | Ausgabe 6/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Information systems face many threats, such as covert channels, which declassify hidden information by, e.g., analyzing the program execution time. Such threats exist at various stages of the execution of instructions. Even if software developers are able to neutralize these threats in source code, new attack vectors can arise in compiler-generated machine code from these representations. Existing approaches for preventing vulnerabilities have numerous restrictions related to both their functionality and the range of threats that can be found and removed. This study presents a technique for removing threats and generating safer code using dynamic compilation in an execution environment by combining information from program analysis of the malicious code and re-compiling such code to run securely. The proposed approach stores summary information in the form of rules that can be shared among analyses. The annotations enable us to conduct the analyses to mitigate threats. Developers can update the analyses and control the volume of resources that are allocated to perform these analyses by changing the precision. The authors’ experiments show that the binary code created by applying the suggested method is of high quality.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Cowan, C., Wagle, F., Pu, C., Beattie, S., Walpole, J.: Buffer overflows: attacks and defenses for the vulnerability of the decade. In: DARPA Information Survivability Conference and Exposition, 2000. DISCEX ’00. Proceedings, vol. 2, pp. 119–129 (2000) Cowan, C., Wagle, F., Pu, C., Beattie, S., Walpole, J.: Buffer overflows: attacks and defenses for the vulnerability of the decade. In: DARPA Information Survivability Conference and Exposition, 2000. DISCEX ’00. Proceedings, vol. 2, pp. 119–129 (2000)
2.
Zurück zum Zitat Homoliak, I., Ovsonka, D., Koranda, K., Hanacek, P.: Characteristics of buffer overflow attacks tunneled in http traffic. In 2014 International Carnahan Conference on Security Technology (ICCST), pp. 1–6 (2014) Homoliak, I., Ovsonka, D., Koranda, K., Hanacek, P.: Characteristics of buffer overflow attacks tunneled in http traffic. In 2014 International Carnahan Conference on Security Technology (ICCST), pp. 1–6 (2014)
3.
Zurück zum Zitat Liu, J.J., Wang, Y.J.: Study on computer network intrusion effect evaluation. In: 2013 Third International Conference on Instrumentation, Measurement, Computer, Communication and Control (IMCCC), pp. 349–353 (2013) Liu, J.J., Wang, Y.J.: Study on computer network intrusion effect evaluation. In: 2013 Third International Conference on Instrumentation, Measurement, Computer, Communication and Control (IMCCC), pp. 349–353 (2013)
4.
Zurück zum Zitat Khadka, R., Batlajery, B.V., Saeidi, A.M., Jansen, S., Hage, J.: How do professionals perceive legacy systems and software modernization? In: Proceedings of the 36th International Conference on Software Engineering, Ser. ICSE 2014, pp. 36–47. ACM, New York (2014). doi:10.1145/2568225.2568318 Khadka, R., Batlajery, B.V., Saeidi, A.M., Jansen, S., Hage, J.: How do professionals perceive legacy systems and software modernization? In: Proceedings of the 36th International Conference on Software Engineering, Ser. ICSE 2014, pp. 36–47. ACM, New York (2014). doi:10.​1145/​2568225.​2568318
5.
Zurück zum Zitat Wang, S., Lo, D.: Version history, similar report, and structure: putting them together for improved bug localization. In: Proceedings of the 22nd International Conference on Program Comprehension, Ser. ICPC 2014, pp. 53–63. ACM, New York (2014). doi:10.1145/2597008.2597148 Wang, S., Lo, D.: Version history, similar report, and structure: putting them together for improved bug localization. In: Proceedings of the 22nd International Conference on Program Comprehension, Ser. ICPC 2014, pp. 53–63. ACM, New York (2014). doi:10.​1145/​2597008.​2597148
6.
Zurück zum Zitat Chen, T.-H., Nagappan, M., Shihab, E., Hassan, A.E.: An empirical study of dormant bugs. In: Proceedings of the 11th Working Conference on Mining Software Repositories, Ser. MSR 2014, pp. 82–91. ACM, New York (2014). doi:10.1145/2597073.2597108 Chen, T.-H., Nagappan, M., Shihab, E., Hassan, A.E.: An empirical study of dormant bugs. In: Proceedings of the 11th Working Conference on Mining Software Repositories, Ser. MSR 2014, pp. 82–91. ACM, New York (2014). doi:10.​1145/​2597073.​2597108
7.
Zurück zum Zitat Camilo, F., Meneely, A., Nagappan, M.: Do bugs foreshadow vulnerabilities? A study of the chromium project. In: Proceedings of the 2015 IEEE/ACM 12th Working Conference on Mining Software Repositories, Ser. MSR ’15. pp. 269–279. IEEE Computer Society, Washington (2015). doi:10.1109/MSR.2015.32 Camilo, F., Meneely, A., Nagappan, M.: Do bugs foreshadow vulnerabilities? A study of the chromium project. In: Proceedings of the 2015 IEEE/ACM 12th Working Conference on Mining Software Repositories, Ser. MSR ’15. pp. 269–279. IEEE Computer Society, Washington (2015). doi:10.​1109/​MSR.​2015.​32
8.
Zurück zum Zitat Zuo, Z.: Efficient statistical debugging via hierarchical instrumentation. In: Proceedings of the 2014 International Symposium on Software Testing and Analysis, Ser. ISSTA 2014, pp. 457–460. ACM, New York (2014). doi:10.1145/2610384.2631833 Zuo, Z.: Efficient statistical debugging via hierarchical instrumentation. In: Proceedings of the 2014 International Symposium on Software Testing and Analysis, Ser. ISSTA 2014, pp. 457–460. ACM, New York (2014). doi:10.​1145/​2610384.​2631833
9.
10.
Zurück zum Zitat Gorantla, S., Kadloor, S., Kiyavash, N., Coleman, T., Moskowitz, I., Kang, M.: Characterizing the efficacy of the nrl network pump in mitigating covert timing channels. IEEE Trans. Inf. Forensics Secur. 7(1), 64–75 (2012)CrossRef Gorantla, S., Kadloor, S., Kiyavash, N., Coleman, T., Moskowitz, I., Kang, M.: Characterizing the efficacy of the nrl network pump in mitigating covert timing channels. IEEE Trans. Inf. Forensics Secur. 7(1), 64–75 (2012)CrossRef
13.
Zurück zum Zitat Makki, B., Beygi, L., Eriksson, T.: Channel capacity bounds in the presence of quantized channel state information. EURASIP J. Wirel. Commun. Netw. (2010). doi:10.1155/2010/495014 Makki, B., Beygi, L., Eriksson, T.: Channel capacity bounds in the presence of quantized channel state information. EURASIP J. Wirel. Commun. Netw. (2010). doi:10.​1155/​2010/​495014
16.
Zurück zum Zitat Kononenko, K.: A unified approach to identifying and healing vulnerabilities in x86 machine code. In: Proceedings of the 18th Annual International Conference on Mobile Computing and Networking, Ser. Mobicom ’12, pp. 397–398. ACM, New York (2012). doi:10.1145/2348543.2348593 Kononenko, K.: A unified approach to identifying and healing vulnerabilities in x86 machine code. In: Proceedings of the 18th Annual International Conference on Mobile Computing and Networking, Ser. Mobicom ’12, pp. 397–398. ACM, New York (2012). doi:10.​1145/​2348543.​2348593
17.
Zurück zum Zitat Kononenko, K.: Demo: dynamic neutralization of data leakages. In: Proceedings of the 2015 Workshop on Wireless of the Students, by the Students,&; for the Students, Ser. S3 ’15. pp. 21–21. ACM, New York (2015). doi:10.1145/2801694.2802141 Kononenko, K.: Demo: dynamic neutralization of data leakages. In: Proceedings of the 2015 Workshop on Wireless of the Students, by the Students,&; for the Students, Ser. S3 ’15. pp. 21–21. ACM, New York (2015). doi:10.​1145/​2801694.​2802141
18.
19.
Zurück zum Zitat Das, S.K., Kant, K., Zhang, N.: Handbook on Securing Cyber-Physical Critical Infrastructure. Morgan Kaufmann Publishers Inc., San Francisco (2012) Das, S.K., Kant, K., Zhang, N.: Handbook on Securing Cyber-Physical Critical Infrastructure. Morgan Kaufmann Publishers Inc., San Francisco (2012)
20.
21.
Zurück zum Zitat Perkins, J.H., Kim, S., Larsen, S., Amarasinghe, S., Bachrach, J., Carbin, M., Pacheco, C., Sherwood, F., Sidiroglou, S., Sullivan, G., Wong, W.-F., Zibin, Y., Ernst, M.D., Rinard, M.: Automatically patching errors in deployed software. In: Proceedings of the ACM SIGOPS 22nd Symposium on Operating Systems Principles, Ser. SOSP ’09, pp. 87–102. ACM, New York (2009). doi:10.1145/1629575.1629585 Perkins, J.H., Kim, S., Larsen, S., Amarasinghe, S., Bachrach, J., Carbin, M., Pacheco, C., Sherwood, F., Sidiroglou, S., Sullivan, G., Wong, W.-F., Zibin, Y., Ernst, M.D., Rinard, M.: Automatically patching errors in deployed software. In: Proceedings of the ACM SIGOPS 22nd Symposium on Operating Systems Principles, Ser. SOSP ’09, pp. 87–102. ACM, New York (2009). doi:10.​1145/​1629575.​1629585
24.
Zurück zum Zitat Smith, E.K., Barr, E.T., LeGoues, C., Brun, Y.: Is the cure worse than the disease? Overfitting in automated program repair. In: Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, Ser. ESEC/FSE 2015, pp. 532–543. ACM, New York (2015). doi:10.1145/2786805.2786825 Smith, E.K., Barr, E.T., LeGoues, C., Brun, Y.: Is the cure worse than the disease? Overfitting in automated program repair. In: Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, Ser. ESEC/FSE 2015, pp. 532–543. ACM, New York (2015). doi:10.​1145/​2786805.​2786825
25.
Zurück zum Zitat Monperrus, M.: A critical review of “automatic patch generation learned from human-written patches”: Essay on the problem statement and the evaluation of automatic software repair. In: Proceedings of the 36th International Conference on Software Engineering, Ser. ICSE 2014. pp. 234–242. ACM, New York (2014). doi:10.1145/2568225.2568324 Monperrus, M.: A critical review of “automatic patch generation learned from human-written patches”: Essay on the problem statement and the evaluation of automatic software repair. In: Proceedings of the 36th International Conference on Software Engineering, Ser. ICSE 2014. pp. 234–242. ACM, New York (2014). doi:10.​1145/​2568225.​2568324
26.
Zurück zum Zitat Raggo, M.T., Hosmer, C.: Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols, 1st edn. Syngress Publishing, Boston (2013) Raggo, M.T., Hosmer, C.: Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols, 1st edn. Syngress Publishing, Boston (2013)
27.
Zurück zum Zitat Wang, C., Ju, S.: The dilemma of covert channels searching. In: Proceedings of the 8th International Conference on Information Security and Cryptology, Ser. ICISC’05, pp. 169–174. Springer, Berlin (2006). doi:10.1007/11734727_15 Wang, C., Ju, S.: The dilemma of covert channels searching. In: Proceedings of the 8th International Conference on Information Security and Cryptology, Ser. ICISC’05, pp. 169–174. Springer, Berlin (2006). doi:10.​1007/​11734727_​15
28.
Zurück zum Zitat Pandey, M., Sarda, S.: LLVM Cookbook. Packt Publishing, Birmingham (2015) Pandey, M., Sarda, S.: LLVM Cookbook. Packt Publishing, Birmingham (2015)
30.
Zurück zum Zitat Kononenko, K.: Libjit linear scan: a model for fast and efficient compilation. Int. Rev. Model. Simul. 3(5), 1035–1044 (2010) Kononenko, K.: Libjit linear scan: a model for fast and efficient compilation. Int. Rev. Model. Simul. 3(5), 1035–1044 (2010)
31.
Zurück zum Zitat Kononenko, K.: Fast compilation in o(n). In: Proceedings of the 2010 International Conference on Theoretical and Mathematical Foundations of Computer Science, Ser. TMFCS ’10, pp. 51–56 (2010) Kononenko, K.: Fast compilation in o(n). In: Proceedings of the 2010 International Conference on Theoretical and Mathematical Foundations of Computer Science, Ser. TMFCS ’10, pp. 51–56 (2010)
33.
Zurück zum Zitat Nuzman, D., Eres, R., Dyshel, S., Zalmanovici, M., Castanos, J.: Jit technology with C/C++: Feedback-directed dynamic recompilation for statically compiled languages. ACM Trans. Archit. Code Optim. 10(4), 59:1–59:25 (2013). doi:10.1145/2541228.2555315 Nuzman, D., Eres, R., Dyshel, S., Zalmanovici, M., Castanos, J.: Jit technology with C/C++: Feedback-directed dynamic recompilation for statically compiled languages. ACM Trans. Archit. Code Optim. 10(4), 59:1–59:25 (2013). doi:10.​1145/​2541228.​2555315
35.
Zurück zum Zitat Lee, W., Hong, H., Yi, K., Cheon, J.H.: Static analysis with set-closure in secrecy. In: Static analysis. 22nd International Symposium, SAS 2015, Saint-Malo, France, September 9–11, 2015, Proceedings. pp. 18–35. Springer, Berlin (2015). doi:10.1007/978-3-662-48288-9_2 Lee, W., Hong, H., Yi, K., Cheon, J.H.: Static analysis with set-closure in secrecy. In: Static analysis. 22nd International Symposium, SAS 2015, Saint-Malo, France, September 9–11, 2015, Proceedings. pp. 18–35. Springer, Berlin (2015). doi:10.​1007/​978-3-662-48288-9_​2
36.
Zurück zum Zitat Köpf, B., Smith, G.: Vulnerability bounds and leakage resilience of blinded cryptography under timing attacks. In: Proceedings of the 2010 23rd IEEE Computer Security Foundations Symposium, Ser. CSF ’10, pp. 44–56. IEEE Computer Society, Washington (2010). doi:10.1109/CSF.2010.11 Köpf, B., Smith, G.: Vulnerability bounds and leakage resilience of blinded cryptography under timing attacks. In: Proceedings of the 2010 23rd IEEE Computer Security Foundations Symposium, Ser. CSF ’10, pp. 44–56. IEEE Computer Society, Washington (2010). doi:10.​1109/​CSF.​2010.​11
37.
Zurück zum Zitat Giles, J., Hajek, B.: An information-theoretic and game-theoretic study of timing channels. IEEE Trans. Inf. Theory 48, 2455–2477 (2002)MathSciNetCrossRefMATH Giles, J., Hajek, B.: An information-theoretic and game-theoretic study of timing channels. IEEE Trans. Inf. Theory 48, 2455–2477 (2002)MathSciNetCrossRefMATH
38.
Zurück zum Zitat Wray, J.: An analysis of covert timing channels. In: 1991 IEEE Computer Society Symposium on Research in Security and Privacy, 1991. Proceedings, pp. 2–7 (1991) Wray, J.: An analysis of covert timing channels. In: 1991 IEEE Computer Society Symposium on Research in Security and Privacy, 1991. Proceedings, pp. 2–7 (1991)
39.
Zurück zum Zitat Li, P., Gao, D., Reiter, M.: Mitigating access-driven timing channels in clouds using stopwatch. In: 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), pp. 1–12 (2013) Li, P., Gao, D., Reiter, M.: Mitigating access-driven timing channels in clouds using stopwatch. In: 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), pp. 1–12 (2013)
40.
Zurück zum Zitat Zhang, D., Askarov, A., Myers, A.C.: Predictive mitigation of timing channels in interactive systems. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, Ser. CCS ’11, pp. 563–574. ACM, New York (2011). doi:10.1145/2046707.2046772 Zhang, D., Askarov, A., Myers, A.C.: Predictive mitigation of timing channels in interactive systems. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, Ser. CCS ’11, pp. 563–574. ACM, New York (2011). doi:10.​1145/​2046707.​2046772
41.
Zurück zum Zitat Davies, T., Karlsson, C., Liu, H., Ding, C., Chen, Z.: High performance linpack benchmark: a fault tolerant implementation without checkpointing. In: Proceedings of the International Conference on Supercomputing, Ser. ICS ’11, pp. 162–171. ACM, New York (2011). doi:10.1145/1995896.1995923 Davies, T., Karlsson, C., Liu, H., Ding, C., Chen, Z.: High performance linpack benchmark: a fault tolerant implementation without checkpointing. In: Proceedings of the International Conference on Supercomputing, Ser. ICS ’11, pp. 162–171. ACM, New York (2011). doi:10.​1145/​1995896.​1995923
42.
Zurück zum Zitat Coppens, B., Verbauwhede, I., Bosschere, K.D., Sutter, B.D.: Practical mitigations for timing-based side-channel attacks on modern x86 processors. In: 2012 IEEE Symposium on Security and Privacy, pp. 45–60 (2009) Coppens, B., Verbauwhede, I., Bosschere, K.D., Sutter, B.D.: Practical mitigations for timing-based side-channel attacks on modern x86 processors. In: 2012 IEEE Symposium on Security and Privacy, pp. 45–60 (2009)
Metadaten
Titel
Development of dynamic protection against timing channels
verfasst von
Shahrzad Kananizadeh
Kirill Kononenko
Publikationsdatum
22.12.2016
Verlag
Springer Berlin Heidelberg
Erschienen in
International Journal of Information Security / Ausgabe 6/2017
Print ISSN: 1615-5262
Elektronische ISSN: 1615-5270
DOI
https://doi.org/10.1007/s10207-016-0356-7

Weitere Artikel der Ausgabe 6/2017

International Journal of Information Security 6/2017 Zur Ausgabe