Security through Diversity Leveraging Virtual Machine Technology

被引:45
作者
Williams, Daniel [1 ]
Hu, Wei [1 ]
Davidson, Jack W. [1 ]
Hiser, Jason D. [1 ]
Knight, John C. [1 ]
Nguyen-Tuong, Anh [1 ]
机构
[1] Univ Virginia, Dept Comp Sci, Charlottesville, VA 22903 USA
基金
美国国家科学基金会;
关键词
Artificial diversity; IT monoculture; Security; Virtual machine;
D O I
10.1109/MSP.2009.18
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Biologists have long recognized the dangers of the lack of diversity or monocultures in biological systems. Recently, it has been noted that much of the fragility of our networked computing systems can be attributed to the lack of diversity or monoculture of our software systems. The problem is severe. Because it is virtually inevitable that software will ship with flaws, our software monoculture leaves systems open to large-scale attacks by knowledgeable adversaries. Inspired by the resilience of diverse biological systems, the authors developed the Genesis Software Development Toolchain. An innovative aspect of Genesis is the use of an application-level virtual machine technology that enables the application of diversity transforms at any point in the software toolchain. Using Genesis, they authors demonstrated that diversity, when judiciously applied, is a practical and effective defense against two widely used types of attacksreturn-to-libc and code injection. © 2006 IEEE.
引用
收藏
页码:26 / 33
页数:8
相关论文
共 14 条
[1]   DATA DIVERSITY - AN APPROACH TO SOFTWARE FAULT TOLERANCE [J].
AMMANN, PE ;
KNIGHT, JC .
IEEE TRANSACTIONS ON COMPUTERS, 1988, 37 (04) :418-425
[2]  
Avizienis A., 1977, P 1 IEEE INT COMPUTE, P149
[3]  
Barrantes E.G., 2003, P 10 ACM C COMPUTER, P281, DOI DOI 10.1145/948109.948147
[4]  
BHATKAR S, 2005, P 14 C US SEC S US A
[5]  
COWAN C, 2003, P GCC DEV SUMM
[6]   Link-time optimization of ARM binaries [J].
De Bus, B ;
De Sutter, B ;
Van Put, L ;
Chanet, D ;
De Bosschere, K .
ACM SIGPLAN NOTICES, 2004, 39 (07) :211-220
[7]   Building diverse computer systems [J].
Forrest, S ;
Somayaji, A ;
Ackley, DH .
SIXTH WORKSHOP ON HOT TOPICS IN OPERATING SYSTEMS, PROCEEDINGS, 1997, :67-72
[8]  
HU W, 2006, P 2 INT C VIRT EX EN, P2
[9]  
KC GS, 2003, P 10 ACM C COMP COMM, P272
[10]  
Kiriansky V, 2002, USENIX ASSOCIATION PROCEEDINGS OF THE 11TH USENIX SECURITY SYMPOSIUM, P191