Compiler-instrumented, Dynamic Secret-Redaction of Legacy Processes for Attacker Deception
نویسندگان
چکیده
An enhanced dynamic taint-tracking semantics is presented and implemented, facilitating fast and precise runtime secret redaction from legacy processes, such as those compiled from C/C++. The enhanced semantics reduce the annotation burden imposed upon developers seeking to add secret-redaction capabilities to legacy code, while curtailing over-tainting and label creep. An implementation for LLVM’s DataFlow Sanitizer automatically instruments taint-tracking and secretredaction support into annotated C/C++ programs at compile-time, yielding programs that can self-censor their address spaces in response to emerging cyber-attacks. The technology is applied to produce the first information flow-based honey-patching architecture for the Apache web server. Rather than merely blocking intrusions, the modified server deceptively diverts attacker connections to secret-sanitized process clones that monitor attacker activities and disinform adversaries with honey-data.
منابع مشابه
Secrecy and Deception in Anti-Terrorism Resource Allocation and Policy Implication
In this paper, we develop a game-theoretic model for whether and what a defender should disclose about her resource allocation in the homeland-security context. Our model allows us to explore whether the defender should disclose correct information about her defensive resource allocation (truthful disclosure), incorrect information (deception), or no information (secrecy). In the case where onl...
متن کاملModeling secrecy and deception in a multiple-period attacker-defender signaling game
In this paper, we apply game theory to model strategies of secrecy and deception in a multiple-period attacker–defender resource-allocation and signaling game with incomplete information. At each period, we allow one of the three possible types of defender signals—truthful disclosure, secrecy, and deception. We also allow two types of information updating—the attacker updates his knowledge abou...
متن کاملDeceptive Secret Sharing
We propose deceptive secret sharing, which is a novel approach to provide both confidentiality and deception in distributed storage systems. The motivation for this is to protect confidentiality as far as possible while acknowledging that no confidentiality scheme provides perfect protection. If confidentiality is breached and information is accessed by unauthorized individuals, our deceptive s...
متن کاملExperience Report: Rapid Reengineering of Legacy Software using Java Reflection
The objective of this paper is to describe our experience in rapidly reengineering legacy software through the application of Java reflection in a research compiler. This process would be of value to language evolution and development e↵orts, in general, and reengineering e↵orts, in particular. It was performed in the course of a software project that has slowly evolved from a simple language t...
متن کاملA Two-Sided Optimization for Theater Ballistic Missile Defense
We describe JOINT DEFENDER, a new two-sided optimization model for planning the pre-positioning of defensive missile interceptors to counter an attack threat. In our basic model, a defender pre-positions ballistic missile defense platforms to minimize the worst-case damage an attacker can achieve; we assume that the attacker will be aware of defensive pre-positioning decisions, and that both si...
متن کامل