On the Effectiveness of Software Diversity: A Systematic Study on Real-World Vulnerabilities

Many systems have been introduced to detect software intrusions by comparing the outputs and behavior of diverse replicas when they are processing the same, potentially malicious, input. When these replicas are constructed using off-the-shelf software products, it is assumed that they are diverse an...

Full description

Saved in:
Bibliographic Details
Main Authors: HAN, Jin, GAO, Debin, DENG, Robert H.
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2009
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/327
https://ink.library.smu.edu.sg/context/sis_research/article/1326/viewcontent/Han2009_Chapter_OnTheEffectivenessOfSoftware_pv.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-1326
record_format dspace
spelling sg-smu-ink.sis_research-13262022-02-18T01:47:35Z On the Effectiveness of Software Diversity: A Systematic Study on Real-World Vulnerabilities HAN, Jin GAO, Debin DENG, Robert H. Many systems have been introduced to detect software intrusions by comparing the outputs and behavior of diverse replicas when they are processing the same, potentially malicious, input. When these replicas are constructed using off-the-shelf software products, it is assumed that they are diverse and not compromised simultaneously under the same attack. In this paper, we analyze vulnerabilities published in 2007 to evaluate the extent to which this assumption is valid. We focus on vulnerabilities in application software, and show that the majority of these software products --- including those providing the same service (and therefore multiple software substitutes can be used in a replicated system to detect intrusions) and those that run on multiple operating systems (and therefore the same software can be used in a replicated system with different operating systems to detect intrusions) --- either do not have the same vulnerability or cannot be compromised with the same exploit. We also find evidence that indicates the use of diversity in increasing attack tolerance for other software. These results show that systems utilizing off-the-shelf software products to introduce diversity are effective in detecting intrusions. 2009-07-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/327 info:doi/10.1007/978-3-642-02918-9_8 https://ink.library.smu.edu.sg/context/sis_research/article/1326/viewcontent/Han2009_Chapter_OnTheEffectivenessOfSoftware_pv.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Information Security
spellingShingle Information Security
HAN, Jin
GAO, Debin
DENG, Robert H.
On the Effectiveness of Software Diversity: A Systematic Study on Real-World Vulnerabilities
description Many systems have been introduced to detect software intrusions by comparing the outputs and behavior of diverse replicas when they are processing the same, potentially malicious, input. When these replicas are constructed using off-the-shelf software products, it is assumed that they are diverse and not compromised simultaneously under the same attack. In this paper, we analyze vulnerabilities published in 2007 to evaluate the extent to which this assumption is valid. We focus on vulnerabilities in application software, and show that the majority of these software products --- including those providing the same service (and therefore multiple software substitutes can be used in a replicated system to detect intrusions) and those that run on multiple operating systems (and therefore the same software can be used in a replicated system with different operating systems to detect intrusions) --- either do not have the same vulnerability or cannot be compromised with the same exploit. We also find evidence that indicates the use of diversity in increasing attack tolerance for other software. These results show that systems utilizing off-the-shelf software products to introduce diversity are effective in detecting intrusions.
format text
author HAN, Jin
GAO, Debin
DENG, Robert H.
author_facet HAN, Jin
GAO, Debin
DENG, Robert H.
author_sort HAN, Jin
title On the Effectiveness of Software Diversity: A Systematic Study on Real-World Vulnerabilities
title_short On the Effectiveness of Software Diversity: A Systematic Study on Real-World Vulnerabilities
title_full On the Effectiveness of Software Diversity: A Systematic Study on Real-World Vulnerabilities
title_fullStr On the Effectiveness of Software Diversity: A Systematic Study on Real-World Vulnerabilities
title_full_unstemmed On the Effectiveness of Software Diversity: A Systematic Study on Real-World Vulnerabilities
title_sort on the effectiveness of software diversity: a systematic study on real-world vulnerabilities
publisher Institutional Knowledge at Singapore Management University
publishDate 2009
url https://ink.library.smu.edu.sg/sis_research/327
https://ink.library.smu.edu.sg/context/sis_research/article/1326/viewcontent/Han2009_Chapter_OnTheEffectivenessOfSoftware_pv.pdf
_version_ 1770570387236585472