Run-Time Randomization to Mitigate Tampering
- Bertrand Anckaert ,
- Mariusz Jakubowski ,
- Ramarathnam Venkatesan ,
- Koen De Bosschere
2nd International Workshop on Security (IWSEC 2007) |
The problem of defending software against tampering by a malicious host is not expected to be solved soon. Rather than trying to defend against the first attack, randomization tries to minimize the impact of a successful attack. Unfortunately, widespread adoption of this technique is hampered by its incompatibility with the current software distribution model, which requires identical physical copies. The ideas presented in this paper are a compromise between distributing identical copies and unique executions by diversifying at run time, based upon additional chaff input and variable program state. This makes it harder to zoom in on a point of interest and may fool an attacker into believing that he has succeeded, while the attack will work only for a short period of time, a small number of computers, or a subset of the input space.