Chaos for a Fast, Secure, and Predictable Future

نویسندگان

  • John Criswell
  • Vikram Adve
چکیده

Violating a program’s semantics for fun and profit is a time honored hacker tradition. Compilers defend against such fiends by inserting run-time checks to enforce semantic safety properties. Safe language compilers insert type checks for down-casts, information flow compilers [11] add run-time checks to prevent information leakage, and tools like SAFECode [8], WIT [1], and DFI [6] insert run-time checks to detect memory errors in C code. While effective, run-time checks often incur extra CPU and/or memory overhead. This is especially true when enforcing safety properties on C code [8, 1]. Instead of detecting or tolerating violations of semantic safety properties, perhaps we can gain better performance by making the results of such violations unpredictable. Attackers often rely on violations of semantic safety properties having specific, predictable outcomes at the machine-code level. What if violations of safety properties could be guaranteed to produce unpredictable behavior? While randomization for security has been proposed for limited purposes [4, 5, 10, 15, 3], we believe that there is a more general principle afoot: many attacks utilizing semantic violations that are stopped using run-time checks can also be reliably thwarted using randomization techniques. The primary difference is that the former detects or prevents violations while the latter permits a violation but prevents an attacker from exploiting it. In Section 2, we describe previous work that illustrates a semantic safety property used to enforce memory safety and how randomization can provide similar safety with less CPU and address space overhead than run-time checks. We will then generalize this principle and argue that randomization can enforce other semantic safety properties by showing novel, potential randomization techniques for enforcing information flow policies, type-safety, and data-flow integrity.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Secure Chaos-Based Communication Scheme in Multipath Fading Channels Using Particle Filtering

In recent years chaotic secure communication and chaos synchronization have received ever increasing attention. Unfortunately, despite the advantages of chaotic systems, Such as, noise-like correlation, easy hardware implementation, multitude of chaotic modes, flexible control of their dynamics, chaotic self-synchronization phenomena and potential communication confidence due to the very dynami...

متن کامل

Applied Cryptography Using Chaos Function for Fast Digital Logic-Based Systems in Ubiquitous Computing

Recently, chaotic dynamics-based data encryption techniques for wired and wireless networks have become a topic of active research in computer science and network security such as robotic systems, encryption, and communication. The main aim of deploying a chaos-based cryptosystem is to provide encryption with several advantages over traditional encryption algorithms such as high security, speed...

متن کامل

Frequency–driven chaos in the electrical circuit of Duffing-Holmes oscillator and its control

Accurate detection of weak periodic signals within noise and possibility of secure messaging have made Duffing oscillator (DO) highly important in the field of communication. Investigation on the properties of DO is thus ardently sought for. An elegant approach to accomplish the same is to fabricate electronic circuit simulating DO non-linear equation and to study the effect of input signal amp...

متن کامل

Nonlinear Multiuser Receiver for Optimized Chaos-Based DS-CDMA Systems

Chaos based communications have drawn increasing attention over the past years. Chaotic signals are derived from non-linear dynamic systems. They are aperiodic, broadband and deterministic signals that appear random in the time domain. Because of these properties, chaotic signals have been proposed to generate spreading sequences for wide-band secure communication recently. Like conventional DS...

متن کامل

تحلیل آشوب، تجزیۀ موجک و شبکۀ عصبی در پیش‌بینی شاخص بورس تهران

This study investigates predictability, chaos analysis, wavelet decomposition and the performance of neural network models in forecasting the return series of the Tehran Stock Exchange Index (TEDPIX). For this purpose, the daily data from April 24, 2009 to May 3, 2012 is used. Results show that TEDPIX series is chaotic and predictable with nonlinear effect. Also, according to obtained inverse o...

متن کامل

Cryptanalyzing a discrete-time chaos synchronization secure communication system

This paper describes the security weakness of a recently proposed secure communication method based on discrete-time chaos synchronization. We show that the security is compromised even without precise knowledge of the chaotic system used. We also make many suggestions to improve its security in future versions.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010