The Cracker Patch Choice: An Analysis of Post Hoc Security Techniques

It has long been known that security is easiest to achieve when it is designed in from the start. Unfortunately, it has also become evident that systems built with security as a priority are rarely selected for wide spread deployment, because most consumers choose features, convenience, and performance over security. Thus security officers are often denied the option of choosing a truly secure solution, and instead must choose among a variety of post hoc security adaptations. We classify security enhancing methods, and compare and contrast these methods in terms of their effectiveness vs. cost of deployment. Our analysis provides practitioners with a guide for when to develop and deploy various kinds of post hoc security adaptations.

[1]  Markus G. Kuhn,et al.  Analysis of a denial of service attack on TCP , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).

[2]  Wietse Z. Venema,et al.  TCP Wrapper: Network Monitoring, Access Control, and Booby Traps , 1992, USENIX Summer.

[3]  George C. Necula,et al.  Safe kernel extensions without run-time checking , 1996, OSDI '96.

[4]  Hilarie K. Orman,et al.  Experimental results of covert channel limitation in one-way communication systems , 1997, Proceedings of SNDSS '97: Internet Society 1997 Symposium on Network and Distributed System Security.

[5]  Jerome H. Saltzer,et al.  The protection of information in computer systems , 1975, Proc. IEEE.

[6]  Bob Blakley,et al.  Some weaknesses of the TCB model , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).

[7]  Matt Bishop,et al.  Attack class: address spoofing , 1997 .

[8]  Mudge How to write buffer overflows , 1997 .

[9]  Nathan P. Smith,et al.  Stack Smashing Vulnerabilities in the UNIX Operating System , 1997 .

[10]  Charles Consel,et al.  A general approach for run-time specialization and its application to C , 1996, POPL '96.

[11]  Charles Consel,et al.  Safe Operating System Specialization: the RPC Case Study , 1996 .

[12]  A. One,et al.  Smashing The Stack For Fun And Profit , 1996 .

[13]  Robert O. Hastings,et al.  Fast detection of memory leaks and access errors , 1991 .

[14]  Crispan Cowan,et al.  StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks , 1998, USENIX Security Symposium.

[15]  Calton Pu,et al.  Optimistic incremental specialization: streamlining a commercial operating system , 1995, SOSP.

[16]  David H. Ackley,et al.  Building diverse computer systems , 1997, Proceedings. The Sixth Workshop on Hot Topics in Operating Systems (Cat. No.97TB100133).

[17]  Calton Pu,et al.  Death, taxes, and imperfect software: surviving the inevitable , 1998, NSPW '98.

[18]  Philip Koopman,et al.  Comparing the robustness of POSIX operating systems , 1999, Digest of Papers. Twenty-Ninth Annual International Symposium on Fault-Tolerant Computing (Cat. No.99CB36352).

[19]  Stephen Smalley,et al.  The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments , 2000 .