. 24/7 Space News .
CYBER WARS
New software continuously scrambles code to foil cyber attacks
by Staff Writers
New York NY (SPX) Nov 18, 2016


File image.

As long as humans are writing software, there will be coding mistakes for malicious hackers to exploit. A single bug can open the door to attackers deleting files, copying credit card numbers or carrying out political mischief.

A new program called Shuffler tries to preempt such attacks by allowing programs to continuously scramble their code as they run, effectively closing the window of opportunity for an attack. The technique is described in a study presented this month at the USENIX Symposium on Operating Systems and Design (OSDI) in Savannah, Ga.

"Shuffler makes it nearly impossible to turn a bug into a functioning attack, defending software developers from their mistakes," said the study's lead author, David Williams-King, a graduate student at Columbia Engineering. "Attackers are unable to figure out the program's layout if the code keeps changing."

Even after repeated debugging, software typically contains up to 50 errors per 1,000 lines of code, each a potential avenue for attack. Though security defenses are constantly evolving, attackers are quick to find new ways in.

In the early 2000s, computer operating systems adopted a security feature called address space layout randomization, or ASLR. This technique rearranges memory when a program launches, making it harder for hackers to find and reuse existing code to take over the machine. But hackers soon discovered they could exploit memory disclosure bugs to grab code fragments once the program was already running.

Shuffler was developed to deflect this latter style of code-reuse attack. It takes ASLR's code-scrambling approach to the extreme by randomizing small blocks of code every 20 to 50 milliseconds, imposing a severe deadline on would-be attackers. Until now, shifting around running code as a security measure was thought to be technically impractical because existing solutions require specialized hardware or software.

In the above demo, "#"s represent code in memory as a typical web server runs. When the server shifts to running with Shuffler, the '#'s move every 50 milliseconds. The shuffled web server serves the web page seen at the end of the demo.

"By the time the server returns the information the attacker needs, it is already invalid --Shuffler has already relocated the respective code snippets to different memory locations," said study coauthor Vasileios Kemerlis, a computer science professor at Brown University.

Designed to be user-friendly, Shuffler runs alongside the code it defends, without modifications to program compilers or the computer's operating system. It even randomizes itself to defend against possible bugs in its own code.

The researchers say Shuffler runs faster and requires fewer system changes than similar continuous-randomization software such TASR and Remix, developed at MIT Lincoln Labs and Florida State University respectively.

As an invitation to other researchers to try and break Shuffler, Williams-King is currently running the software on his personal website. (He can check that the code is shuffling and whether anyone has attacked the site by reviewing the program's logs).

On computation-heavy workloads, Shuffler slows programs by 15 percent on average, but at larger scales--a webserver running on 12 CPU cores, for example--the drop in performance is negligible, the researchers say.

This versatility means that software distributors as well as security-conscious individuals could be potential end users. "It's the first system that is trying to be a serious defense that people can use, right now," said Williams-King.

Shuffler needs a few last improvements before it is made public. The researchers say they want to make it easier to use on software they haven't yet tested. They also want to improve Shuffler's ability to defend against exploits that take advantage of server-crashes.

"Billions of lines of vulnerable code are out there," said the study's senior author, Junfeng Yang, a computer science professor at Columbia Engineering and member of the Data Science Institute. "Rather than finding every bug or rewriting all billions of lines of code in safer languages, Shuffler instantly lets us build a stronger defense."


Comment on this article using your Disqus, Facebook, Google or Twitter login.


Thanks for being here;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Contributor
$5 Billed Once


credit card or paypal
SpaceDaily Monthly Supporter
$5 Billed Monthly


paypal only


.


Related Links
Columbia University School of Engineering and Applied Science
Cyberwar - Internet Security News - Systems and Policy Issues






Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle

Previous Report
CYBER WARS
Britain approves extradition of alleged hacker to US
London (AFP) Nov 14, 2016
Britain's interior minister on Monday ordered the extradition to the United States of a man accused of hacking into thousands of US government computers. Lauri Love, 31, faces three separate charges for allegedly hacking into the networks of the US Federal Reserve, US Army and NASA, among others, in 2012 and 2013. Interior Minister Amber Rudd paved the way for his extradition nearly two ... read more


CYBER WARS
Russian New Generation Satellites to Undergo First Flight Tests in 2020

NASA, U.S. Navy Practice Orion Recovery Procedures

Russia space center to work with US on spaceflight biomed issues

Progress, but uphill slog for women in tech

CYBER WARS
Ariane 5 at launch zone for Nov 17 mission with four Galileo satellites

Airbus Safran Launchers and ESA sign confirmation of the Ariane 6 program

US revives hypersonic aerospace research

JCSAT-15 arrives in Kourou for Dec Ariane 5 launch

CYBER WARS
Meteorites reveal lasting drought on Mars

Opportunity heads to next waypoint at over 27 miles on the odometer

A funnel on mars could be a place to look for life

Novel Analysis Technique Helps Solve Beagle 2 Mystery

CYBER WARS
China launches pulsar test satellite

China's Chang'e-2 a success

Long March-5 reflects China's "greatest advancement" yet in rockets

New heavy-lift carrier rocket boosts China's space dream

CYBER WARS
Can India beat China at its game with common satellite for South Asia

SSL delivers powerful, high capacity broadband satellite for Hughes to Cape Canaveral

NASA to Launch Fleet of Hurricane-Tracking SmallSats

NASA small satellites will take a fresh look at Earth

CYBER WARS
Dry adhesive holds in extreme cold, strengthens in extreme heat

Elbit Systems Reveals New Emergency Scenarios Virtual Reality Trainer

First random laser made of paper-based ceramics

A new type of convection is proven in granular gases

CYBER WARS
Earth-bound instrument analyzes light from planets circling distant stars

Protoplanetary Discs Being Shaped by Newborn Planets

Scientists unveil latest exoplanet-hunter CHARIS

What happens to a pathogenic fungus grown in space?

CYBER WARS
Mystery solved behind birth of Saturn's rings

Last Bits of 2015 Pluto Flyby Data Received on Earth

Uranus may have two undiscovered moons

Possible Clouds on Pluto, Next Target is Reddish









The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us.