Instruction Set Limitation in Support of Software Diversity View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2009

AUTHORS

Bjorn De Sutter , Bertrand Anckaert , Jens Geiregat , Dominique Chanet , Koen De Bosschere

ABSTRACT

This paper proposes a novel technique, called instruction set limitation, to strengthen the resilience of software diversification against collusion attacks. Such attacks require a tool to match corresponding program fragments in different, diversified program versions. The proposed technique limits the types of instructions occurring in a program to the most frequently occurring types, by replacing the infrequently used types as much as possible by more frequently used ones. As such, this technique, when combined with diversification techniques, reduces the number of easily matched code fragments. The proposed technique is evaluated against a powerful diversification tool for Intel’s x86 and an optimized matching process on a number of SPEC 2006 benchmarks. More... »

PAGES

152-165

References to SciGraph publications

  • 2005. Steganography for Executables and Code Transformation Signatures in INFORMATION SECURITY AND CRYPTOLOGY – ICISC 2004
  • Book

    TITLE

    Information Security and Cryptology – ICISC 2008

    ISBN

    978-3-642-00729-3
    978-3-642-00730-9

    Author Affiliations

    Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/978-3-642-00730-9_10

    DOI

    http://dx.doi.org/10.1007/978-3-642-00730-9_10

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1043836322


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0801", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Artificial Intelligence and Image Processing", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information and Computing Sciences", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "alternateName": "Ghent University", 
              "id": "https://www.grid.ac/institutes/grid.5342.0", 
              "name": [
                "Electronics and Information Systems Department, Ghent University, Sint-Pietersnieuwstraat 41, 9000, Ghent, Belgium"
              ], 
              "type": "Organization"
            }, 
            "familyName": "De Sutter", 
            "givenName": "Bjorn", 
            "id": "sg:person.014214375307.41", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014214375307.41"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Ghent University", 
              "id": "https://www.grid.ac/institutes/grid.5342.0", 
              "name": [
                "Electronics and Information Systems Department, Ghent University, Sint-Pietersnieuwstraat 41, 9000, Ghent, Belgium"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Anckaert", 
            "givenName": "Bertrand", 
            "id": "sg:person.013243217423.37", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013243217423.37"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Ghent University", 
              "id": "https://www.grid.ac/institutes/grid.5342.0", 
              "name": [
                "Electronics and Information Systems Department, Ghent University, Sint-Pietersnieuwstraat 41, 9000, Ghent, Belgium"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Geiregat", 
            "givenName": "Jens", 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Ghent University", 
              "id": "https://www.grid.ac/institutes/grid.5342.0", 
              "name": [
                "Electronics and Information Systems Department, Ghent University, Sint-Pietersnieuwstraat 41, 9000, Ghent, Belgium"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Chanet", 
            "givenName": "Dominique", 
            "id": "sg:person.014127656317.52", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014127656317.52"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Ghent University", 
              "id": "https://www.grid.ac/institutes/grid.5342.0", 
              "name": [
                "Electronics and Information Systems Department, Ghent University, Sint-Pietersnieuwstraat 41, 9000, Ghent, Belgium"
              ], 
              "type": "Organization"
            }, 
            "familyName": "De Bosschere", 
            "givenName": "Koen", 
            "id": "sg:person.013465130107.96", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013465130107.96"
            ], 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "https://doi.org/10.1145/1250734.1250746", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1002972102"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/948109.948149", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1015832109"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/1210268.1210273", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1017178751"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/268946.268962", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1022024311"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/11496618_31", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1028969833", 
              "https://doi.org/10.1007/11496618_31"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/11496618_31", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1028969833", 
              "https://doi.org/10.1007/11496618_31"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/582419.582445", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1039452920"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/1102546.1102560", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1046844112"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2009", 
        "datePublishedReg": "2009-01-01", 
        "description": "This paper proposes a novel technique, called instruction set limitation, to strengthen the resilience of software diversification against collusion attacks. Such attacks require a tool to match corresponding program fragments in different, diversified program versions. The proposed technique limits the types of instructions occurring in a program to the most frequently occurring types, by replacing the infrequently used types as much as possible by more frequently used ones. As such, this technique, when combined with diversification techniques, reduces the number of easily matched code fragments. The proposed technique is evaluated against a powerful diversification tool for Intel\u2019s x86 and an optimized matching process on a number of SPEC 2006 benchmarks.", 
        "editor": [
          {
            "familyName": "Lee", 
            "givenName": "Pil Joong", 
            "type": "Person"
          }, 
          {
            "familyName": "Cheon", 
            "givenName": "Jung Hee", 
            "type": "Person"
          }
        ], 
        "genre": "chapter", 
        "id": "sg:pub.10.1007/978-3-642-00730-9_10", 
        "inLanguage": [
          "en"
        ], 
        "isAccessibleForFree": true, 
        "isPartOf": {
          "isbn": [
            "978-3-642-00729-3", 
            "978-3-642-00730-9"
          ], 
          "name": "Information Security and Cryptology \u2013 ICISC 2008", 
          "type": "Book"
        }, 
        "name": "Instruction Set Limitation in Support of Software Diversity", 
        "pagination": "152-165", 
        "productId": [
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1043836322"
            ]
          }, 
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/978-3-642-00730-9_10"
            ]
          }, 
          {
            "name": "readcube_id", 
            "type": "PropertyValue", 
            "value": [
              "d0cf1d2a563c22ee4603ad418c7419329ed744dc22bf6459b1bf6a8050f9e688"
            ]
          }
        ], 
        "publisher": {
          "location": "Berlin, Heidelberg", 
          "name": "Springer Berlin Heidelberg", 
          "type": "Organisation"
        }, 
        "sameAs": [
          "https://doi.org/10.1007/978-3-642-00730-9_10", 
          "https://app.dimensions.ai/details/publication/pub.1043836322"
        ], 
        "sdDataset": "chapters", 
        "sdDatePublished": "2019-04-16T07:06", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000352_0000000352/records_60369_00000000.jsonl", 
        "type": "Chapter", 
        "url": "https://link.springer.com/10.1007%2F978-3-642-00730-9_10"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-00730-9_10'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-00730-9_10'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-00730-9_10'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-00730-9_10'


     

    This table displays all metadata directly associated to this object as RDF triples.

    119 TRIPLES      23 PREDICATES      34 URIs      20 LITERALS      8 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/978-3-642-00730-9_10 schema:about anzsrc-for:08
    2 anzsrc-for:0801
    3 schema:author N1a9a6ba7d75941358e9da0cc3cd4b205
    4 schema:citation sg:pub.10.1007/11496618_31
    5 https://doi.org/10.1145/1102546.1102560
    6 https://doi.org/10.1145/1210268.1210273
    7 https://doi.org/10.1145/1250734.1250746
    8 https://doi.org/10.1145/268946.268962
    9 https://doi.org/10.1145/582419.582445
    10 https://doi.org/10.1145/948109.948149
    11 schema:datePublished 2009
    12 schema:datePublishedReg 2009-01-01
    13 schema:description This paper proposes a novel technique, called instruction set limitation, to strengthen the resilience of software diversification against collusion attacks. Such attacks require a tool to match corresponding program fragments in different, diversified program versions. The proposed technique limits the types of instructions occurring in a program to the most frequently occurring types, by replacing the infrequently used types as much as possible by more frequently used ones. As such, this technique, when combined with diversification techniques, reduces the number of easily matched code fragments. The proposed technique is evaluated against a powerful diversification tool for Intel’s x86 and an optimized matching process on a number of SPEC 2006 benchmarks.
    14 schema:editor Nec0059ac6ad14b85a9ffdb19a8ca02d5
    15 schema:genre chapter
    16 schema:inLanguage en
    17 schema:isAccessibleForFree true
    18 schema:isPartOf N8a83b33054934ea1a3a5d34ca104bbe7
    19 schema:name Instruction Set Limitation in Support of Software Diversity
    20 schema:pagination 152-165
    21 schema:productId N1a559f73293b44f38eee3763ca4701cf
    22 N3a8fad3b67ff46e28449c2ce98214e85
    23 Nd75cc9793d3d45f197502c60942a4ce4
    24 schema:publisher N7c497e7259444ac3baa0a9dc1e15e0f1
    25 schema:sameAs https://app.dimensions.ai/details/publication/pub.1043836322
    26 https://doi.org/10.1007/978-3-642-00730-9_10
    27 schema:sdDatePublished 2019-04-16T07:06
    28 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    29 schema:sdPublisher N71d5a3f830cc4ce7be9d0faf463abba2
    30 schema:url https://link.springer.com/10.1007%2F978-3-642-00730-9_10
    31 sgo:license sg:explorer/license/
    32 sgo:sdDataset chapters
    33 rdf:type schema:Chapter
    34 N0cbb21a309694cbab00f8daf654fa34b rdf:first sg:person.013465130107.96
    35 rdf:rest rdf:nil
    36 N1a559f73293b44f38eee3763ca4701cf schema:name readcube_id
    37 schema:value d0cf1d2a563c22ee4603ad418c7419329ed744dc22bf6459b1bf6a8050f9e688
    38 rdf:type schema:PropertyValue
    39 N1a9a6ba7d75941358e9da0cc3cd4b205 rdf:first sg:person.014214375307.41
    40 rdf:rest Nc78b40379f054c9a8838442b8880ef5c
    41 N3a8fad3b67ff46e28449c2ce98214e85 schema:name doi
    42 schema:value 10.1007/978-3-642-00730-9_10
    43 rdf:type schema:PropertyValue
    44 N54b81cc9f5374e4982615c896d607361 schema:affiliation https://www.grid.ac/institutes/grid.5342.0
    45 schema:familyName Geiregat
    46 schema:givenName Jens
    47 rdf:type schema:Person
    48 N57993f9434644697abb551d6568f9135 rdf:first N54b81cc9f5374e4982615c896d607361
    49 rdf:rest N9e53fe1a780e4b8db08ea45cef6c79dc
    50 N71d5a3f830cc4ce7be9d0faf463abba2 schema:name Springer Nature - SN SciGraph project
    51 rdf:type schema:Organization
    52 N7c497e7259444ac3baa0a9dc1e15e0f1 schema:location Berlin, Heidelberg
    53 schema:name Springer Berlin Heidelberg
    54 rdf:type schema:Organisation
    55 N8a83b33054934ea1a3a5d34ca104bbe7 schema:isbn 978-3-642-00729-3
    56 978-3-642-00730-9
    57 schema:name Information Security and Cryptology – ICISC 2008
    58 rdf:type schema:Book
    59 N95f7fcb407fe48e5a07511d09550a848 rdf:first Ne4381fca54374778a5b76abfc6ace353
    60 rdf:rest rdf:nil
    61 N9e53fe1a780e4b8db08ea45cef6c79dc rdf:first sg:person.014127656317.52
    62 rdf:rest N0cbb21a309694cbab00f8daf654fa34b
    63 Nc423753d6bed471db57667949f1903bc schema:familyName Lee
    64 schema:givenName Pil Joong
    65 rdf:type schema:Person
    66 Nc78b40379f054c9a8838442b8880ef5c rdf:first sg:person.013243217423.37
    67 rdf:rest N57993f9434644697abb551d6568f9135
    68 Nd75cc9793d3d45f197502c60942a4ce4 schema:name dimensions_id
    69 schema:value pub.1043836322
    70 rdf:type schema:PropertyValue
    71 Ne4381fca54374778a5b76abfc6ace353 schema:familyName Cheon
    72 schema:givenName Jung Hee
    73 rdf:type schema:Person
    74 Nec0059ac6ad14b85a9ffdb19a8ca02d5 rdf:first Nc423753d6bed471db57667949f1903bc
    75 rdf:rest N95f7fcb407fe48e5a07511d09550a848
    76 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
    77 schema:name Information and Computing Sciences
    78 rdf:type schema:DefinedTerm
    79 anzsrc-for:0801 schema:inDefinedTermSet anzsrc-for:
    80 schema:name Artificial Intelligence and Image Processing
    81 rdf:type schema:DefinedTerm
    82 sg:person.013243217423.37 schema:affiliation https://www.grid.ac/institutes/grid.5342.0
    83 schema:familyName Anckaert
    84 schema:givenName Bertrand
    85 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013243217423.37
    86 rdf:type schema:Person
    87 sg:person.013465130107.96 schema:affiliation https://www.grid.ac/institutes/grid.5342.0
    88 schema:familyName De Bosschere
    89 schema:givenName Koen
    90 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013465130107.96
    91 rdf:type schema:Person
    92 sg:person.014127656317.52 schema:affiliation https://www.grid.ac/institutes/grid.5342.0
    93 schema:familyName Chanet
    94 schema:givenName Dominique
    95 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014127656317.52
    96 rdf:type schema:Person
    97 sg:person.014214375307.41 schema:affiliation https://www.grid.ac/institutes/grid.5342.0
    98 schema:familyName De Sutter
    99 schema:givenName Bjorn
    100 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014214375307.41
    101 rdf:type schema:Person
    102 sg:pub.10.1007/11496618_31 schema:sameAs https://app.dimensions.ai/details/publication/pub.1028969833
    103 https://doi.org/10.1007/11496618_31
    104 rdf:type schema:CreativeWork
    105 https://doi.org/10.1145/1102546.1102560 schema:sameAs https://app.dimensions.ai/details/publication/pub.1046844112
    106 rdf:type schema:CreativeWork
    107 https://doi.org/10.1145/1210268.1210273 schema:sameAs https://app.dimensions.ai/details/publication/pub.1017178751
    108 rdf:type schema:CreativeWork
    109 https://doi.org/10.1145/1250734.1250746 schema:sameAs https://app.dimensions.ai/details/publication/pub.1002972102
    110 rdf:type schema:CreativeWork
    111 https://doi.org/10.1145/268946.268962 schema:sameAs https://app.dimensions.ai/details/publication/pub.1022024311
    112 rdf:type schema:CreativeWork
    113 https://doi.org/10.1145/582419.582445 schema:sameAs https://app.dimensions.ai/details/publication/pub.1039452920
    114 rdf:type schema:CreativeWork
    115 https://doi.org/10.1145/948109.948149 schema:sameAs https://app.dimensions.ai/details/publication/pub.1015832109
    116 rdf:type schema:CreativeWork
    117 https://www.grid.ac/institutes/grid.5342.0 schema:alternateName Ghent University
    118 schema:name Electronics and Information Systems Department, Ghent University, Sint-Pietersnieuwstraat 41, 9000, Ghent, Belgium
    119 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...