Mechanisms for protecting software integrity in networked systems

作者: Peng Ning , Chongkyung Kil

DOI:

关键词: Software developmentData integritySecurity bugSoftware development processNational Vulnerability DatabaseComputer scienceExecutableMemory corruptionCode segmentComputer security

摘要: Protecting software integrity is a key to successfully maintain its own credibility and reduce the financial technical risks caused from lack of integrity. Although researchers have been putting effort on improving development techniques preventing human errors during process, it still daunting task make non-vulnerable in practice. For example, national vulnerability database shows that set new vulnerabilities are discovered every day. Since developing hardly achievable, this research, we look for way achieve while they used. In particular, dissertation investigates three mechanisms protect at runtime. Firstly, presents protection mechanism can thwart attacks try exploit memory corruption software. The provided by randomizing program's runtime address layout objects. As result, hinders an attacker being able easily predict their target addresses. implemented novel binary rewriting tool randomly place code data segments programs perform fine-grained permutation function bodies segment as well global variables segment. Our evaluation results show minimal performance overhead with orders magnitude improvement randomness. Secondly, identification named CBones discover how unknown C exploited verifying program structural constraints. automatically extracts constraints via analysis compiled executable. CBone then verifies these monitors execution detect isolate security bugs. real-world applications known all no false alarms, pinpoint corrupting instructions, provide information facilitate understanding attack exploits bug. Lastly, identifies need dynamic attestation overcome limitations existing remote approaches. To best our knowledge, first introduce notion propose use system properties proof running system. validate idea, develop application-level ReDAS (Remote Dynamic Attestation System) verify provides evidence checking properties: These collected each application, representing application's unique behavior must be satisfied also uses hardware support TPM potential attacks. effective capturing violations zero demonstrates incurs 8% average performing measurements.

参考文章(30)
Ravishankar K. Iyer, Emre C. Sezer, Shuo Chen, Prachi Gauriar, Jun Xu, Non-control-data attacks are realistic threats usenix security symposium. pp. 12- 12 ,(2005)
Vern Paxson, Stuart Staniford, Nicholas Weaver, Stefan Savage, Colleen Shannon, David Moore, The Spread of the Sapphire/Slammer Worm ,(2003)
Reiner Sailer, Leendert van Doorn, Trent Jaeger, Xiaolan Zhang, Design and implementation of a TCG-based integrity measurement architecture usenix security symposium. pp. 16- 16 ,(2004)
Mark Shaneck, Karthikeyan Mahadevan, Vishal Kher, Yongdae Kim, Remote software-based attestation for wireless sensors security of ad hoc and sensor networks. pp. 27- 41 ,(2005) , 10.1007/11601494_3
Daniel C. DuVarney, Sandeep Bhatkar, R. Sekar, Address obfuscation: an efficient approach to combat a board range of memory error exploits usenix security symposium. pp. 8- 8 ,(2003)
Daniel C. DuVarney, Sandeep Bhatkar, R. Sekar, Efficient techniques for comprehensive protection from memory error exploits usenix security symposium. pp. 17- 17 ,(2005)
Juan A. Garay, Lorenz Huelsbergen, Software integrity protection using timed executable agents Proceedings of the 2006 ACM Symposium on Information, computer and communications security - ASIACCS '06. pp. 189- 200 ,(2006) , 10.1145/1128817.1128847
Peter A. Loscocco, Perry W. Wilson, J. Aaron Pendergrass, C. Durward McDonell, Linux kernel integrity measurement using contextual inspection Proceedings of the 2007 ACM workshop on Scalable trusted computing - STC '07. pp. 21- 29 ,(2007) , 10.1145/1314354.1314362