DocumentCode :
583159
Title :
CAWDOR: Compiler Assisted Worm Defense
Author :
Yuan, Jun ; Johnson, Rob
Author_Institution :
Dept. of Comput. Sci., Stony Brook Univ., Stony Brook, NY, USA
fYear :
2012
fDate :
23-24 Sept. 2012
Firstpage :
54
Lastpage :
63
Abstract :
This paper explores how much the source code analysis can assist worm defense system. Previously-proposed worm defense systems have used disparate mechanisms to detect worms, analyze exploits, verify alerts, and apply mitigations. Furthermore, previous systems have not offered predictability, i.e. it is not possible to verify, in advance, that the defense system will never generate a mitigation that breaks the program. This paper describes a program transformation technique that makes collaborative worm defense systems easy to build, predictable and fast-responsive. Our transformation provides a single building block that can be used to perform worm detection, exploit analysis, alert verification, and mitigation application. In fact, our transformation makes most of these tasks trivial. Furthermore, software vendors and users can test, in advance, that the defense system will very unlikely apply a mitigation that breaks their software. Mitigations are vulnerability-specific not exploit-specific. Finally, our system can respond extremely quickly to a new worm. The exploit analysis becomes trivial so sentinel hosts can issue an alert the instant they detect a worm. We have implemented a prototype of our system based on the Jones and Kelly program transformation for memory safety. During normal operation, our system incurs only 5% overhead. We take advantage of static analysis to develop several optimizations and make the Jones and Kelly approach to memory safety efficient and practical.
Keywords :
computer viruses; formal verification; optimisation; program compilers; program diagnostics; source coding; Jones and Kelly approach; alert verification; collaborative worm defense systems; compiler assisted worm defense; exploit analysis; memory safety; optimization; program transformation technique; source code analysis; static analysis; vulnerability specific mitigation; worm detection; Collaboration; Grippers; Instruments; Optimization; Registers; Safety; Solids;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Source Code Analysis and Manipulation (SCAM), 2012 IEEE 12th International Working Conference on
Conference_Location :
Trento
Print_ISBN :
978-1-4673-2398-7
Type :
conf
DOI :
10.1109/SCAM.2012.30
Filename :
6392102
Link To Document :
بازگشت