Title :
Attack Mitigation through Diversity
Author :
Kanter, Morgon ; Taylor, Stephen
Author_Institution :
Thayer Sch. of Eng., Dartmouth Coll., Hanover, NH, USA
Abstract :
Cloud computing has become popular in recent years due to the cost and resource savings associated with virtual machines using shared resources. Unfortunately, this mode of operation serves as a vulnerability amplifier because each computer executes multiple versions of the same operating code base carrying the same vulnerabilities. This paper explores compiler and linker based approaches to increase attacker workload by generating diversity in the binary code associated with a single source. This is achieved by injecting randomness into the binary image. Entropy is used as a metric of diversity and we explore the relationship between three components of this measure: padding entropy within a logical block, ordering entropy over a program, and joint entropy associated with function layout. Collectively these components can be combined in an analytical expression that provides an upper bound on the number of variants that can be generated for a single source code. This general approach serves as a basis for combining additional transformations. These transformations can then be applied to diversify operating systems and military cloud applications, such as Apache Accumulo.
Keywords :
cloud computing; computer network security; entropy; program compilers; attack mitigation; binary code; binary image; cloud computing; entropy metric; logical block; ordering entropy; resource saving; source code; vulnerability amplifier; Benchmark testing; Diversity reception; Entropy; Kernel; Layout; Programming; Virtual machine monitors; computer security; information security;
Conference_Titel :
Military Communications Conference, MILCOM 2013 - 2013 IEEE
Conference_Location :
San Diego, CA
DOI :
10.1109/MILCOM.2013.239