Automated Software Diversity

Automated Software Diversity

Per Larsen, Stefan Brunthaler, Lucas Davi, Ahmad-Reza Sadeghi, Michael Franz
ISBN: 9781627057349 | PDF ISBN: 9781627057554
Copyright © 2016 | 88 Pages | Publication Date: December 23, 2015

BEFORE YOU ORDER: You may have Academic or Corporate access to this title. Click here to find out: 10.2200/S00686ED1V01Y201512SPT014

Ordering Options: Paperback $35.00   E-book $28.00   Paperback & E-book Combo $43.75

Why pay full price? Members receive 15% off all orders.
Learn More Here

Read Our Digital Content License Agreement (pop-up)

Purchasing Options:

Whereas user-facing applications are often written in modern languages, the firmware, operating system, support libraries, and virtual machines that underpin just about any modern computer system are still written in low-level languages that value flexibility and performance over convenience and safety. Programming errors in low-level code are often exploitable and can, in the worst case, give adversaries unfettered access to the compromised host system.

This book provides an introduction to and overview of automatic software diversity techniques that, in one way or another, use randomization to greatly increase the difficulty of exploiting the vast amounts of low-level code in existence. Diversity-based defenses are motivated by the observation that a single attack will fail against multiple targets with unique attack surfaces. We introduce the many, often complementary, ways that one can diversify attack surfaces and provide an accessible guide to more than two decades worth of research on the topic. We also discuss techniques used in conjunction with diversity to prevent accidental disclosure of randomized program aspects and present an in-depth case study of one of our own diversification solutions.

Table of Contents

Attacking and Defending
What to Diversify
When to Diversify
Case Study: Compile-time Diversification
Information Leakage Resilience
Advanced Topics
Authors' Biographies

About the Author(s)

Per Larsen, Immunant, Inc.
Per Larsen recently decided to try his luck as an entrepreneur and currently leads an information security startup: Immunant, Inc. Previously, he worked four years as a postdoctoral scholar at the University of California, Irvine. He graduated with a Ph.D. from the Technical University of Denmark in 2011. He enjoys caffeinated beverages and staying up very late.

Stefan Brunthaler, SBA Research (Vienna, Austria)
Stefan Brunthaler received a Dr.techn. with distinction from TU Vienna in 2011 and spent the next four years as postdoctoral scholar at the University of California, Irvine. Currently, he is a key researcher at SBA Research in Vienna, Austria, working on various topics in language-based security.

Lucas Davi, Intel Collaborative Research Institute for Secure Computing
Lucas Davi is a researcher at the Intel Collaborative Research Institute for Secure Computing (ICRI-SC) at Technische Universitat Darmstadt, Germany. He received his Ph.D. from Technische Universitat Darmstadt, Germany, in computer science, focusing on code-reuse attacks and defenses. His research focuses on exploits such as return-oriented programming (ROP) for diverse processor architectures. He is working on new attack methods and countermeasures against exploits such as control-flow integrity and software diversity.

Ahmad-Reza Sadeghi, Technische Universitat Darmstadt (Germany)
Ahmad-Reza Sadeghi is a full professor of Computer Science at Technische Universitat Darmstadt, Germany. He is the head of the System Security Lab at the Center for Advanced Security Research Darmstadt (CASED) and the Director of the Intel Collaborative Research Institute for Secure Computing (ICRI-SC) at TU Darmstadt. He holds a Ph.D. in Computer Science from the University of Saarland in Saarbrucken, Germany. Prior to academia, he worked in Research and Development of Telecommunications enterprises, amongst others Ericsson Telecommunications.

Michael Franz, Secure Systems and Software Laboratory (UC Irvine)
Michael Franz is the director of the Secure Systems and Software Laboratory at the University of California, Irvine (UCI). He is a Full Professor of Computer Science in UCI's Donald Bren School of Information and Computer Sciences and a Full Professor of Electrical Engineering and Computer Science (by courtesy) in UCI's Henry Samueli School of Engineering. Prof. Franz was an early pioneer in the areas of mobile code and dynamic compilation. He created an early just-in-time compilation system, contributed to the theory and practice of continuous compilation and optimization, and co-invented the trace compilation technology that eventually became the JavaScript engine in Mozilla's Firefox browser. Franz received a Dr. sc. techn. degree in Computer Science and a Dipl. Informatik-Ing. ETH degree, both from the Swiss Federal Institute of Technology, ETH Zurich.

Browse by Subject
Case Studies in Engineering
ACM Books
SEM Books
0 items

Note: Registered customers go to: Your Account to subscribe.

E-Mail Address:

Your Name: