Cryptographic Path Hardening: Hiding Vulnerabilities in Software through Cryptography

Computer Science – Software Engineering

Scientific paper

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

Accepted as part of Off-the-beaten track at POPL 2012

Scientific paper

We propose a novel approach to improving software security called Cryptographic Path Hardening, which is aimed at hiding security vulnerabilities in software from attackers through the use of provably secure and obfuscated cryptographic devices to harden paths in programs. By "harden" we mean that certain error-checking if-conditionals in a given program P are replaced by equivalent" we mean that adversaries cannot use semi-automatic program analysis techniques to reason about the hardened program paths and thus cannot discover as-yet-unknown errors along those paths, except perhaps through black-box dictionary attacks or random testing (which we can never prevent). Other than these unpreventable attack methods, we can make program analysis aimed at error-finding "provably hard" for a resource-bounded attacker, in the same sense that cryptographic schemes are hard to break. Unlike security-through-obscurity, in Cryptographic Path Hardening we use provably-secure crypto devices to hide errors and our mathematical arguments of security are the same as the standard ones used in cryptography. One application of Cryptographic Path Hardening is that software patches or filters often reveal enough information to an attacker that they can be used to construct error-revealing inputs to exploit an unpatched version of the program. By "hardening" the patch we make it difficult for the attacker to analyze the patched program to construct error-revealing inputs, and thus prevent him from potentially constructing exploits.

No associations

LandOfFree

Say what you really think

Search LandOfFree.com for scientists and scientific papers. Rate them and share your experience with other people.

Rating

Cryptographic Path Hardening: Hiding Vulnerabilities in Software through Cryptography does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.

If you have personal experience with Cryptographic Path Hardening: Hiding Vulnerabilities in Software through Cryptography, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Cryptographic Path Hardening: Hiding Vulnerabilities in Software through Cryptography will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFWR-SCP-O-186948

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.