Software Defenses Inspired by Biodiversity
Today’s software monoculture creates asymmetric threats. An attacker needs to find only one way in, while defenders need to guard a lot of ground.
- Starts at
TU Wien, Campus Argentinierstraße
1040 Vienna, Argentinierstraße 8
Adversaries can fully debug and perfect their attacks on their own computers, exactly replicating the environment that they will later be targeting. Software diversity raises the bar to attackers. A diversification engine automatically generates a large number of different versions of the same program, potentially one unique version for every computer. These all behave in exactly the same way from the perspective of the end-user, but they implement their functionality in subtly different ways. As a result, a specific attack will succeed on only a small fraction of targets and a large number of different attack vectors would be needed to take over a significant percentage of them. Because an attacker has no way of knowing a priori which specific attack will succeed on which specific target, this method also very significantly increases the cost of attacks directed at specific targets. We have built such a diversification engine which is now available as a prototype. We can diversify large software distributions such as the Firefox and Chromium web browsers or a complete Linux distribution. Some preliminary insights will be presented as well as some practical issues, such as the problem of reporting errors when every binary is unique.
Zu diesem Vortrag lädt der Arbeitsbereich für Programmiersprachen und Übersetzer am Institut für Computersprachen herzlich ein. Tee: 10:30 Uhr in der Bibliothek E185.1, Argentinierstr. 8, 4. Stock (Mitte).
- Prof. Dr. Michael Franz, University of California, Irvine, CA, USA
Note: This is one of the thousands of items we imported from the old website. We’re in the process of reviewing each and every one, but if you notice something strange about this particular one, please let us know. — Thanks!