SoK: Automated Software Diversity

被引:189
作者
Larsen, Per [1 ]
Homescu, Andrei [1 ]
Brunthaler, Stefan [1 ]
Franz, Michael [1 ]
机构
[1] Univ Calif Irvine, Irvine, CA 92717 USA
来源
2014 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2014) | 2014年
基金
美国国家科学基金会;
关键词
SECURITY;
D O I
10.1109/SP.2014.25
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The idea of automatic software diversity is at least two decades old. The deficiencies of currently deployed defenses and the transition to online software distribution (the "App store" model) for traditional and mobile computers has revived the interest in automatic software diversity. Consequently, the literature on diversity grew by more than two dozen papers since 2008. Diversity offers several unique properties. Unlike other defenses, it introduces uncertainty in the target. Precise knowledge of the target software provides the underpinning for a wide range of attacks. This makes diversity a broad rather than narrowly focused defense mechanism. Second, diversity offers probabilistic protection similar to cryptography attacks may succeed by chance so implementations must offer high entropy. Finally, the design space of diversifying program transformations is large. As a result, researchers have proposed multiple approaches to software diversity that vary with respect to threat models, security, performance, and practicality. In this paper, we systematically study the state-of-the-art in software diversity and highlight fundamental trade-offs between fully automated approaches. We also point to open areas and unresolved challenges. These include "hybrid solutions", error reporting, patching, and implementation disclosure attacks on diversified software.
引用
收藏
页码:276 / 291
页数:16
相关论文
共 69 条
[1]  
Anand K., 2013, Proceedings of the 8th ACM European Conference on Computer Systems, EuroSys '13, P295
[2]  
[Anonymous], 1995, P 25 INT S FAULT TOL, DOI DOI 10.1109/FTCSH.1995.532621
[3]  
[Anonymous], PROCEEDINGS
[4]  
[Anonymous], 2013, ACM SIGSAC S INFORM
[5]  
[Anonymous], 2005, P 12 ACM C COMP COMM
[6]  
Avizienis A., 1977, P 1 IEEE INT COMPUTE, P149
[7]  
Barrantes E. G., 2005, ACM Transactions on Information and Systems Security, V8, P3, DOI 10.1145/1053283.1053286
[8]  
Bhatkar S, 2003, USENIX ASSOCIATION PROCEEDINGS OF THE 12TH USENIX SECURITY SYMPOSIUM, P105
[9]  
Bhatkar S., P 14 USENIX SEC S SE, P271
[10]  
Bhatkar S, 2008, LECT NOTES COMPUT SC, V5137, P1, DOI [10.1007/978-3-540-70542-0_1, 10.1145/1556444.1556449]