Skip to main content

2015 | OriginalPaper | Buchkapitel

ISA\(^2\)R: Improving Software Attack and Analysis Resilience via Compiler-Level Software Diversity

verfasst von : Rafael Fedler, Sebastian Banescu, Alexander Pretschner

Erschienen in: Computer Safety, Reliability, and Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The current IT landscape is characterized by software monoculture: All installations of one program version are identical. This leads to a huge return of investment for attackers who can develop a single attack once to compromise millions of hosts worldwide. Software diversity has been proposed as an alternative to software monoculture. In this paper we present a collection of diversification transformations called ISA\(^2\)R, developed for the low-level virtual machine (LLVM). By diversifying the properties crucial to successful exploitation of a vulnerability, we render exploits that work on one installation of a software ineffective against others. Through this we enable developers to add protective measures automatically during compilation. In contrast to similar existing tools, ISA\(^2\)R provides protection against a wider range of attacks and is applicable to all programming languages supported by LLVM.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Allodi, L., Shim, W., Massacci. F.: Quantitative assessment of risk reduction with cybercrime black market monitoring. IEEE Sec. Priv. Workshops (2013) Allodi, L., Shim, W., Massacci. F.: Quantitative assessment of risk reduction with cybercrime black market monitoring. IEEE Sec. Priv. Workshops (2013)
2.
Zurück zum Zitat Banescu, S., Pretschner, A., Battré, D., Cazzulani, S., Shield, R., Thompson, G.: Software-based protection against changeware. In: Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, pp. 231–242 (2015) Banescu, S., Pretschner, A., Battré, D., Cazzulani, S., Shield, R., Thompson, G.: Software-based protection against changeware. In: Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, pp. 231–242 (2015)
3.
Zurück zum Zitat Cohen, F.B.: Operating system protection through program evolution. Comput. Secur. 12(6), 565–584 (1993)CrossRef Cohen, F.B.: Operating system protection through program evolution. Comput. Secur. 12(6), 565–584 (1993)CrossRef
4.
Zurück zum Zitat Collberg, C., Thomborson, C., Low, D.: Manufacturing cheap, resilient, stealthy opaque constructs. In: 25th ACM SIGPLAN-SIGACT, pp. 184–196 (1998) Collberg, C., Thomborson, C., Low, D.: Manufacturing cheap, resilient, stealthy opaque constructs. In: 25th ACM SIGPLAN-SIGACT, pp. 184–196 (1998)
5.
Zurück zum Zitat Forrest, S., Somayaji, A., Ackley, D.: Building diverse computer systems. In: 6th Workshop on Hot Topics in Operating Systems, pp. 67–72, May 1997 Forrest, S., Somayaji, A., Ackley, D.: Building diverse computer systems. In: 6th Workshop on Hot Topics in Operating Systems, pp. 67–72, May 1997
6.
Zurück zum Zitat Hiser, J., Nguyen-Tuong, A., Co, M., Hall, M., Davidson, J.: ILR: where’d my gadgets go? In: IEEE Symposium on Security and Privacy, May 2012 Hiser, J., Nguyen-Tuong, A., Co, M., Hall, M., Davidson, J.: ILR: where’d my gadgets go? In: IEEE Symposium on Security and Privacy, May 2012
7.
Zurück zum Zitat Kocher, P.C.: Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104–113. Springer, Heidelberg (1996) Kocher, P.C.: Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 104–113. Springer, Heidelberg (1996)
8.
Zurück zum Zitat Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999) Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 388–397. Springer, Heidelberg (1999)
9.
Zurück zum Zitat Larsen, P., Homescu, A., Brunthaler, S., Franz, M.: SoK: automated software diversity. In: IEEE Symposium on Security & Privacy (2014) Larsen, P., Homescu, A., Brunthaler, S., Franz, M.: SoK: automated software diversity. In: IEEE Symposium on Security & Privacy (2014)
10.
Zurück zum Zitat Randell, B.: System structure for software fault tolerance. IEEE Trans. Softw. Eng. 1, 220–232 (1975)CrossRef Randell, B.: System structure for software fault tolerance. IEEE Trans. Softw. Eng. 1, 220–232 (1975)CrossRef
11.
Zurück zum Zitat Schechter, S.E.: Computer security strength & risk: a quantitative approach. Ph.D. thesis, Harvard University, Cambridge, Massachusetts, May 2004 Schechter, S.E.: Computer security strength & risk: a quantitative approach. Ph.D. thesis, Harvard University, Cambridge, Massachusetts, May 2004
Metadaten
Titel
ISAR: Improving Software Attack and Analysis Resilience via Compiler-Level Software Diversity
verfasst von
Rafael Fedler
Sebastian Banescu
Alexander Pretschner
Copyright-Jahr
2015
DOI
https://doi.org/10.1007/978-3-319-24255-2_26

Premium Partner