Jauernig, Patrick Thomas (2024)
Beyond Mitigations: Advancing Attack Surface Reduction and Analysis.
Technische Universität Darmstadt
doi: 10.26083/tuprints-00026529
Ph.D. Thesis, Primary publication, Publisher's Version
Text
Dissertation_Patrick-Jauernig.pdf Copyright Information: CC BY-NC-ND 4.0 International - Creative Commons, Attribution NonCommercial, NoDerivs. Download (9MB) |
Item Type: | Ph.D. Thesis | ||||
---|---|---|---|---|---|
Type of entry: | Primary publication | ||||
Title: | Beyond Mitigations: Advancing Attack Surface Reduction and Analysis | ||||
Language: | English | ||||
Referees: | Sadeghi, Prof. Dr. Ahmad-Reza ; Asokan, Prof. PhD N. | ||||
Date: | 22 January 2024 | ||||
Place of Publication: | Darmstadt | ||||
Collation: | 154 Seiten in verschiedenen Zählungen | ||||
Date of oral examination: | 27 November 2023 | ||||
DOI: | 10.26083/tuprints-00026529 | ||||
Abstract: | In recent decades, we have witnessed an arms race between software attacks and defenses. This ongoing battle has seen modern computer systems incorporating a multitude of defenses, working collaboratively to shield sensitive applications and data from malicious attacks. Despite growing layers of security measures, vulnerabilities persist, often circumventing the most advanced safeguards and putting entire systems at risk. But how can we end this relentless cycle of attack and defense? One crucial aspect to systematically tackle the problem at hand is attack surface reduction, i.e., reducing the code that 1) is reachable by an attacker and 2) can also reach sensitive information. Attack surface reduction is not only applicable to code within an application but also extends to the broader software stack, including libraries and the operating system, which are inherently trusted components, often referred to as the Trusted Computing Base or TCB. Another crucial element is attack surface analysis, which assesses how vulnerable a program is. This analysis plays a pivotal role in uncovering vulnerabilities across the entire software stack, thereby bolstering the security of critical software components like the Trusted Computing Base (TCB). Although attack surface analysis is a well-established concept, recent advances, particularly in the realm of fuzzing, have begun to pave the way for its gradual adoption by the industry. Nonetheless, numerous challenges within this field still must be addressed to make it an integral part of the industry’s software development process. In this dissertation, we design, implement, and evaluate 1) novel attack surface reduction architectures using in-process isolation and enclaves, 2) protocols using these architectures as powerful primitives, and 3) an algorithmic improvement to fuzzing for attack surface analysis. |
||||
Alternative Abstract: |
|
||||
Status: | Publisher's Version | ||||
URN: | urn:nbn:de:tuda-tuprints-265292 | ||||
Classification DDC: | 000 Generalities, computers, information > 004 Computer science | ||||
Divisions: | 20 Department of Computer Science > System Security Lab | ||||
TU-Projects: | Bund/BMBF|16KIS0591|HWSec Bund/BMBF|16KIS0902|iBlockchain |
||||
Date Deposited: | 22 Jan 2024 13:19 | ||||
Last Modified: | 09 Feb 2024 07:31 | ||||
URI: | https://tuprints.ulb.tu-darmstadt.de/id/eprint/26529 | ||||
PPN: | 51535483X | ||||
Export: |
View Item |