Agent security through software mutation

被引:0
|
作者
Simmons, Sharon [1 ]
Edwards, Dennis [1 ]
Zimmerman, Travis [1 ]
机构
[1] Univ W Florida, Dept Comp Sci, Pensacola, FL 32514 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Enhancements to electric power distribution grid reliability and recovery in the face of disruptions are being made possible through the incorporation of agent-based control systems. As more agents replace human controllers, the potential for catastrophic consequences of a cyber-attack are increased. One means of preventing, detecting and recovering from such incidents uses program mutation in a novel way to form the basis of a security framework. The Mutation described in this paper modifies the memory footprint of an executing process without altering its runtime behavior. Mutated processes are shown to be resistant to attacks resulting in arbitrary code execution. Instead of Byzantine failures, attacks on mutated processes result in the more easily detectable crash failure. Replication of mutated code is used with a majority voting algorithm to prevent attack consequences from occurring when an attack eventually bypasses the prevention mechanisms. An example is provided to demonstrate the code modfications done by our mutation engine. The example also shows how the mutations are used against buffer overflow attacks which are generally considered the most common form of attack. Agent controlled power distribution grids require protection from intrusion. Whether the attack originates from a careless employee of from a cyber terrorist, the consequences could be catastrophic. This method can be used to combat known and future forms of attack by giving the system the ability to protect control agents, detect attacks against them, and recover from attacks before serious consequences are realized.
引用
收藏
页码:211 / 215
页数:5
相关论文
共 50 条
  • [31] The Evaluation of Software Security through Quantum Computing Techniques: A Durability Perspective
    Alyami, Hashem
    Nadeem, Mohd
    Alharbi, Abdullah
    Alosaimi, Wael
    Ansari, Md Tarique Jamal
    Pandey, Dhirendra
    Kumar, Rajeev
    Khan, Raees Ahmad
    APPLIED SCIENCES-BASEL, 2021, 11 (24):
  • [32] An empirical study to improve software security through the application of code refactoring
    Mumtaz, Haris
    Alshayeb, Mohammad
    Mahmood, Sajjad
    Niazi, Mahmood
    INFORMATION AND SOFTWARE TECHNOLOGY, 2018, 96 : 112 - 125
  • [33] Applying security policies through agent roles: A JAAS based approach
    Cabri, G
    Ferrari, L
    Leonardi, L
    SCIENCE OF COMPUTER PROGRAMMING, 2006, 59 (1-2) : 127 - 146
  • [34] Enforcement of communications policies in software agent systems through mobile code
    Suri, N
    Carvalho, M
    Bradshaw, JM
    Breedy, MR
    Cowin, TB
    Groth, PT
    Saavedra, R
    Uszok, A
    IEEE 4TH INTERNATIONAL WORKSHOP ON POLICIES FOR DISTRIBUTED SYSTEMS AND NETWORKS, PROCEEDINGS, 2003, : 247 - 250
  • [35] Development of a software security assessment instrument to reduce software security risk
    Gilliam, DP
    Kelly, JC
    Powell, JD
    Bishop, M
    PROCEEDINGS OF THE TENTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, 2001, : 144 - 149
  • [36] Software Security for the People: Free and Open Resources for Software Security Training
    Heymann, Elisa R.
    Miller, Barton P.
    IEEE SECURITY & PRIVACY, 2022, 20 (02) : 88 - 95
  • [37] A Software Agent Enabled Biometric Security Algorithm for Secure File Access in Consumer Storage Devices
    Amin, Ruhul
    Sherratt, R. Simon
    Giri, Debasis
    Islam, S. K. Hafizul
    Khan, Muhammad Khurram
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2017, 63 (01) : 53 - 61
  • [38] Insecure security software?
    IT Archit., 2006, 1 (17):
  • [39] Software Analysis for Security
    Mancoridis, Spiros
    2008 FRONTIERS OF SOFTWARE MAINTENANCE, 2008, : 109 - 118
  • [40] Editorial: Security software
    Zamboni, D
    SOFTWARE-PRACTICE & EXPERIENCE, 2003, 33 (05): : 395 - 396