loading
Documents

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Brady Tello ; Michael Winterrose ; George Baah and Michael Zhivich

Affiliation: MIT Lincoln Laboratory, United States

ISBN: 978-989-758-120-5

Keyword(s): Security, Multi-compiler, Optimization.

Related Ontology Subjects/Areas/Topics: Application Domains ; Case Studies ; Computer-Supported Education ; Enterprise Information Systems ; Formal Methods ; Health Engineering and Technology Applications ; Information Systems Analysis and Specification ; Information Technologies Supporting Learning ; Military and Defense ; Neural Rehabilitation ; Neurotechnology, Electronics and Informatics ; Risk Analysis ; Security ; Security and Privacy ; Serious Games ; Simulation and Modeling ; Simulation Tools and Platforms

Abstract: Periodic randomization of a computer program’s binary code is an attractive technique for defending against several classes of advanced threats. In this paper we describe a model of attacker-defender interaction in which the defender employs such a technique against an attacker who is actively constructing an exploit using Return Oriented Programming (ROP). In order to successfully build a working exploit, the attacker must guess the locations of several small chunks of program code (i.e., gadgets) in the defended program’s memory space. As the attacker continually guesses, the defender periodically rotates to a newly randomized variant of the program, effectively negating any gains the attacker made since the last rotation. Although randomization makes the attacker’s task more difficult, it also incurs a cost to the defender. As such, the defender’s goal is to find an acceptable balance between utility degradation (cost) and security (benefit). One way to measure these two competing factors is the total task latency introduced by both the attacker and any defensive measures taken to thwart him. We simulated a number of diversity strategies under various threat scenarios and present the measured impact on the defender’s task. (More)

PDF ImageFull Text

Download
Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.88.220.93

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Tello, B.; Winterrose, M.; Baah, G. and Zhivich, M. (2015). Simulation based Evaluation of a Code Diversification Strategy.In Proceedings of the 5th International Conference on Simulation and Modeling Methodologies, Technologies and Applications - Volume 1: SIMULTECH, ISBN 978-989-758-120-5, pages 36-43. DOI: 10.5220/0005522200360043

@conference{simultech15,
author={Brady Tello. and Michael Winterrose. and George Baah. and Michael Zhivich.},
title={Simulation based Evaluation of a Code Diversification Strategy},
booktitle={Proceedings of the 5th International Conference on Simulation and Modeling Methodologies, Technologies and Applications - Volume 1: SIMULTECH,},
year={2015},
pages={36-43},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005522200360043},
isbn={978-989-758-120-5},
}

TY - CONF

JO - Proceedings of the 5th International Conference on Simulation and Modeling Methodologies, Technologies and Applications - Volume 1: SIMULTECH,
TI - Simulation based Evaluation of a Code Diversification Strategy
SN - 978-989-758-120-5
AU - Tello, B.
AU - Winterrose, M.
AU - Baah, G.
AU - Zhivich, M.
PY - 2015
SP - 36
EP - 43
DO - 10.5220/0005522200360043

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.