an architecture a day keeps the hacker away
play

An Architecture A Day Keeps The Hacker Away David A. Holland, Ada - PowerPoint PPT Presentation

An Architecture A Day Keeps The Hacker Away David A. Holland, Ada T. Lim, Margo I. Seltzer Harvard University Division of Engineering and Applied Sciences { dholland,ada,margo } @eecs.harvard.edu Weve got a problem. Why? Attacks are


  1. An Architecture A Day Keeps The Hacker Away David A. Holland, Ada T. Lim, Margo I. Seltzer Harvard University Division of Engineering and Applied Sciences { dholland,ada,margo } @eecs.harvard.edu

  2. We’ve got a problem. Why? • Attacks are increasing. • More exposed bad code than ever before. • Patching systems doesn’t scale. • Mindless automated attacks do scale. Monoculture makes the world more fragile. 2 WASSA / October 9, 2004

  3. System/390 to the rescue! Many, perhaps most, attacks are • binary; • not portable; • written for the most popular platforms. Use something else! • Anecdotally, widely done. • Doesn’t scale. 3 WASSA / October 9, 2004

  4. Well, we can fix that. Making your own is too hard... • Design and fab chips? • Port the compiler and OS? ...or is it? • Virtual machine monitors. • Machine descriptions. 4 WASSA / October 9, 2004

  5. This scales, too. Now anyone can make up their own machine. Or you can generate machines randomly. How does that work? 5 WASSA / October 9, 2004

  6. Simpleminded example: Pick the byte size: • 8 bits, 16 bits... • 9 bits? 10 bits? Pick the word size: • 32 bits, 64 bits... • 36 bits? 40 bits? Pick the endianness. 6 WASSA / October 9, 2004

  7. What does this buy us? A lot: • Rules out a broad class of attacks. • Blocks even novel exploit techniques. • Single comprehensive approach. • Puts script kiddies out of business! Maybe. Doesn’t walk the dog, though. 7 WASSA / October 9, 2004

  8. Are there enough machines? We draw a distinction: • Code injection attacks; • State corruption attacks. We have overkill for code injection. State corruption is harder to handle. 8 WASSA / October 9, 2004

  9. Caveats Can exploits be generated from machine descriptions? Is your machine description secret? Can one attack whole sets of machines at once? 9 WASSA / October 9, 2004

  10. Reliability QA is going to love this. 10 WASSA / October 9, 2004

  11. Reliability QA is going to love this. QA is going to love this. 10 WASSA / October 9, 2004

  12. What will it take? Making the general source base portable. Lots of toolchain engineering. Some research remains. 11 WASSA / October 9, 2004

  13. Should we take the trouble? It costs a lot. But it buys us a lot. 12 WASSA / October 9, 2004

  14. Should we take the trouble? Yes. 12 WASSA / October 9, 2004

  15. An Architecture A Day Keeps The Hacker Away David A. Holland, Ada T. Lim, Margo I. Seltzer Harvard University Division of Engineering and Applied Sciences { dholland,ada,margo } @eecs.harvard.edu http://www.eecs.harvard.edu/˜syrah/

Recommend


More recommend