Abstract
Periodic randomization of a computer program’s binary code is an attractive technique for defending against several classes of advanced threats. In this paper we describe a model of attacker-defender interaction in which the defender employs such a technique against an attacker who is actively constructing an exploit using Return Oriented Programming (ROP). In order to successfully build a working exploit, the attacker must guess the locations of several small chunks of program code, known as gadgets, in the defended program’s memory space. The defender thwarts the attacker’s efforts by periodically re-randomizing his code. Randomization incurs some performance cost, therefore an ideal strategy strikes an acceptable balance between utility degradation (cost) and security (benefit). We present risk aware and risk agnostic policy recommendations that were generated using simulation techniques. We found that policies that create low volatility environments are ideal for risk sensitive actors while policies that favor high system performance are more suitable for higher risk appetites.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Data Breach FAQ, Target. Inc. Available from: https://corporate.target.com/about/shopping-experience/payment-card-issue-faq (07 Oct 2014)
The Home Depot Provides Update on Breach Investigation, The Home Depot, Inc. Available from: https://corporate.homedepot.com/mediacenter/pages/statement1.aspx, 8 Sept 2014
Greenwald, G., MacAskill, E., Poitras, L.: (2013) Edward Snowden: The Whistleblower Behind the NSA Surveillance Revelations, The Guardian. Available from: http://www.theguardian.com/world/2013/jun/09/edward-snowden-nsa-whistleblower-surveillance, 9 Oct 2014
Bumiller, E.: Army leak suspect is turned in, by Ex-Hacker. The New York Times. Available from: http://www.nytimes.com/2010/06/08/world/08leaks.html?_r=0, 09 Oct 2014
CVE-2014-0160 2014, MITRE Corporation. 2014. Available from: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160, 09 Oct 2014
Data Execution Prevention: Frequently Asked Questions n.d. Microsoft Corporation. Available from: http://windows.microsoft.com/en-us/windows-vista/data-execution-prevention-frequently-asked-questions, 09 Oct 2014
Abadi, M., Budiu, M., Erlingsson, U., Ligatti, J.: Control-flow integrity: principles, implementations, and applications. In: Proceedings of the 12th ACM Conference on Computer and Communications Security, 9 Oct 2014 (2005)
Okhravi, H., Hobson, T., Bigelow, D., Streilein, W.: Finding focus in the blur of moving target techniques. IEEE Secur Priv 12(2), 16–26 (2014)
Cox, B., Evans, D., Filipi, A., Rowanhill, J.: N-variant systems a secretless framework for security through diversity. In: Proceedings from the 15th Usenix Security Symposium. Available from: http://www.cs.virginia.edu/nvariant/ (2006)
Franz, M.: E Unibus Pluram: massive-scale software diversity as a defense mechanism. In: Proceedings of the 2010 Workshop on New Security Paradigms, pp. 7–16. Available from: ACM Portal: ACM Digital Library (2010)
Priest, B., Vuksani, E., Wagner, N., Tello, B., Carter, K., Streilein, W.: Agent-based simulation in support of moving target cyber defense technology development and evaluation. In: Proceedings of the ACM Spring Simulation Multi-Conference (SpringSim’15) (2015)
Pal, P., Schantz, R., Paulos, A., Benyo, B.: Managed execution environment as a moving-target defense infrastructure. IEEE Secur. Priv. 12(2), 51–59 (2014)
Alfred, G.B., Gray, E.H. (1998) Data farming: A metatechnique for research in the 21st century. Maneuver Warfare Science, pp. 93–99
Barry, P., Koehler, M.: Simulation in context: using data farming for decision support. In: Proceedings of the 2004 Winter Simulation Conference. vol. 1. pp. 814–819. Available from: IEEE XPlore Digital Library (2004)
Bonneau, J.: The science of guessing: analyzing an anonymized corpus of 70 million passwords. In: 2012 IEEE Symposium on Security and Privacy. Available from: IEEE Xplore Digital Library (2012)
Homescu, A., Neisius, S., Larsen, P., Brunthaler, S., Franz, M.: Profile-guided automated software diversity. In: Proceedings of the 2013 International Symposium on Code Generation and Optimization, pp 204–214. Available from: IEEE Xplore Digital Library (2013)
Corelan Team n.d, Corelan ROPdb. Available from: https://www.corelan.be/index.php/security/corelan-ropdb/, 23 Oct 2014
Sharpe, W.F.: Mutual fund performance. J. Bus. 39, 119–138 (1966)
Mitchell, M.: An Introduction to Genetic Algorithms. MIT Press, Cambridge (1996)
Holland, J.: Adaptation in Natural and Artificial Systems: An Introductory Analysis With Applications to Biology, Control, and Artificial Intelligence. University of Michigan Press, Arbor (1975)
Kirkpatrick, S., Gelatt, C.D., Vecchi, M.P.: Optimization by simulated annealing. Science (New Series) 58(2), 671–680 (1983)
Acknowledgements
The authors would like to thank Dr. William Streilein, Dr. Neal Wagner, and Dr. Kevin M. Carter of MIT Lincoln Laboratory for their advice on this paper. This work is sponsored by Defense Advanced Research Projects Agency under. Air Force Contract #FA8721-05-C-0002. Opinions, interpretations, conclusions and recommendations are those of the authors and are not necessarily endorsed by the United States Government. The views, opinions, and/or findings contained in this article are those of the authors and should not be interpreted as representing the official views or policies of the Department of Defense or the U.S. Government.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Tello, B., Winterrose, M., Baah, G., Zhivich, M. (2016). Simulation Driven Policy Recommendations for Code Diversity. In: Obaidat, M., Kacprzyk, J., Ören, T., Filipe, J. (eds) Simulation and Modeling Methodologies, Technologies and Applications. Advances in Intelligent Systems and Computing, vol 442. Springer, Cham. https://doi.org/10.1007/978-3-319-31295-8_2
Download citation
DOI: https://doi.org/10.1007/978-3-319-31295-8_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-31294-1
Online ISBN: 978-3-319-31295-8
eBook Packages: EngineeringEngineering (R0)