【24h】

Ghost Patches: Fake Patches for Fake Vulnerabilities

机译:幽灵补丁:假漏洞的假斑块

获取原文

摘要

Offensive and defensive players in the cyber security sphere constantly react to either party's actions. This reactive approach works well for attackers but can be devastating for defenders. This approach also models the software security patching lifecycle. Patches fix security flaws, but when deployed, can be used to develop malicious exploits. To make exploit generation using patches more resource intensive, we propose inserting deception into software security patches. These ghost patches mislead attackers with deception and fix legitimate flaws in code. An adversary using ghost patches to develop exploits will be forced to use additional resources. We implement a proof of concept for ghost patches and evaluate their impact on program analysis and runtime. We find that these patches have a statistically significant impact on dynamic analysis runtime, increasing time to analyze by a factor of up to 14a;, but do not have a statistically significant impact on program runtime.
机译:网络安全领域的冒犯和防守球员不断对任何一方的行为做出反应。这种反应方法适用于攻击者,但可以为防守者造成毁灭性。这种方法还模拟了软件安全修补生命周期。修补安全漏洞,但部署时,可用于开发恶意漏洞。要使用修补程序更具资源密集的漏洞生成,我们建议将欺骗插入软件安全补丁。这些Ghost在代码中修补了欺骗性并修复了合法缺陷的误导性攻击者。使用Ghost补丁开发利用的对手将被迫使用其他资源。我们为Ghost补丁的概念进行了证明,并评估它们对计划分析和运行时的影响。我们发现这些补丁对动态分析运行时具有统计学意义的影响,增加了分析最多14a的时间的时间,但在程序运行时没有统计上显着的影响。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号