Jauernig, Patrick Thomas (2024)
Beyond Mitigations: Advancing Attack Surface Reduction and Analysis.
Technische Universität Darmstadt
doi: 10.26083/tuprints-00026529
Dissertation, Erstveröffentlichung, Verlagsversion
Kurzbeschreibung (Abstract)
In recent decades, we have witnessed an arms race between software attacks and defenses. This ongoing battle has seen modern computer systems incorporating a multitude of defenses, working collaboratively to shield sensitive applications and data from malicious attacks. Despite growing layers of security measures, vulnerabilities persist, often circumventing the most advanced safeguards and putting entire systems at risk. But how can we end this relentless cycle of attack and defense? One crucial aspect to systematically tackle the problem at hand is attack surface reduction, i.e., reducing the code that 1) is reachable by an attacker and 2) can also reach sensitive information. Attack surface reduction is not only applicable to code within an application but also extends to the broader software stack, including libraries and the operating system, which are inherently trusted components, often referred to as the Trusted Computing Base or TCB. Another crucial element is attack surface analysis, which assesses how vulnerable a program is. This analysis plays a pivotal role in uncovering vulnerabilities across the entire software stack, thereby bolstering the security of critical software components like the Trusted Computing Base (TCB). Although attack surface analysis is a well-established concept, recent advances, particularly in the realm of fuzzing, have begun to pave the way for its gradual adoption by the industry. Nonetheless, numerous challenges within this field still must be addressed to make it an integral part of the industry’s software development process. In this dissertation, we design, implement, and evaluate 1) novel attack surface reduction architectures using in-process isolation and enclaves, 2) protocols using these architectures as powerful primitives, and 3) an algorithmic improvement to fuzzing for attack surface analysis.
Typ des Eintrags: | Dissertation | ||||
---|---|---|---|---|---|
Erschienen: | 2024 | ||||
Autor(en): | Jauernig, Patrick Thomas | ||||
Art des Eintrags: | Erstveröffentlichung | ||||
Titel: | Beyond Mitigations: Advancing Attack Surface Reduction and Analysis | ||||
Sprache: | Englisch | ||||
Referenten: | Sadeghi, Prof. Dr. Ahmad-Reza ; Asokan, Prof. PhD N. | ||||
Publikationsjahr: | 22 Januar 2024 | ||||
Ort: | Darmstadt | ||||
Kollation: | 154 Seiten in verschiedenen Zählungen | ||||
Datum der mündlichen Prüfung: | 27 November 2023 | ||||
DOI: | 10.26083/tuprints-00026529 | ||||
URL / URN: | https://tuprints.ulb.tu-darmstadt.de/26529 | ||||
Kurzbeschreibung (Abstract): | In recent decades, we have witnessed an arms race between software attacks and defenses. This ongoing battle has seen modern computer systems incorporating a multitude of defenses, working collaboratively to shield sensitive applications and data from malicious attacks. Despite growing layers of security measures, vulnerabilities persist, often circumventing the most advanced safeguards and putting entire systems at risk. But how can we end this relentless cycle of attack and defense? One crucial aspect to systematically tackle the problem at hand is attack surface reduction, i.e., reducing the code that 1) is reachable by an attacker and 2) can also reach sensitive information. Attack surface reduction is not only applicable to code within an application but also extends to the broader software stack, including libraries and the operating system, which are inherently trusted components, often referred to as the Trusted Computing Base or TCB. Another crucial element is attack surface analysis, which assesses how vulnerable a program is. This analysis plays a pivotal role in uncovering vulnerabilities across the entire software stack, thereby bolstering the security of critical software components like the Trusted Computing Base (TCB). Although attack surface analysis is a well-established concept, recent advances, particularly in the realm of fuzzing, have begun to pave the way for its gradual adoption by the industry. Nonetheless, numerous challenges within this field still must be addressed to make it an integral part of the industry’s software development process. In this dissertation, we design, implement, and evaluate 1) novel attack surface reduction architectures using in-process isolation and enclaves, 2) protocols using these architectures as powerful primitives, and 3) an algorithmic improvement to fuzzing for attack surface analysis. |
||||
Alternatives oder übersetztes Abstract: |
|
||||
Status: | Verlagsversion | ||||
URN: | urn:nbn:de:tuda-tuprints-265292 | ||||
Sachgruppe der Dewey Dezimalklassifikatin (DDC): | 000 Allgemeines, Informatik, Informationswissenschaft > 004 Informatik | ||||
Fachbereich(e)/-gebiet(e): | 20 Fachbereich Informatik 20 Fachbereich Informatik > Systemsicherheit |
||||
TU-Projekte: | Bund/BMBF|16KIS0591|HWSec Bund/BMBF|16KIS0902|iBlockchain |
||||
Hinterlegungsdatum: | 22 Jan 2024 13:19 | ||||
Letzte Änderung: | 28 Feb 2024 09:15 | ||||
PPN: | |||||
Referenten: | Sadeghi, Prof. Dr. Ahmad-Reza ; Asokan, Prof. PhD N. | ||||
Datum der mündlichen Prüfung / Verteidigung / mdl. Prüfung: | 27 November 2023 | ||||
Export: | |||||
Suche nach Titel in: | TUfind oder in Google |
Frage zum Eintrag |
Optionen (nur für Redakteure)
Redaktionelle Details anzeigen |