Agent security through software mutation

被引:0
|
作者
Simmons, Sharon [1 ]
Edwards, Dennis [1 ]
Zimmerman, Travis [1 ]
机构
[1] Univ W Florida, Dept Comp Sci, Pensacola, FL 32514 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Enhancements to electric power distribution grid reliability and recovery in the face of disruptions are being made possible through the incorporation of agent-based control systems. As more agents replace human controllers, the potential for catastrophic consequences of a cyber-attack are increased. One means of preventing, detecting and recovering from such incidents uses program mutation in a novel way to form the basis of a security framework. The Mutation described in this paper modifies the memory footprint of an executing process without altering its runtime behavior. Mutated processes are shown to be resistant to attacks resulting in arbitrary code execution. Instead of Byzantine failures, attacks on mutated processes result in the more easily detectable crash failure. Replication of mutated code is used with a majority voting algorithm to prevent attack consequences from occurring when an attack eventually bypasses the prevention mechanisms. An example is provided to demonstrate the code modfications done by our mutation engine. The example also shows how the mutations are used against buffer overflow attacks which are generally considered the most common form of attack. Agent controlled power distribution grids require protection from intrusion. Whether the attack originates from a careless employee of from a cyber terrorist, the consequences could be catastrophic. This method can be used to combat known and future forms of attack by giving the system the ability to protect control agents, detect attacks against them, and recover from attacks before serious consequences are realized.
引用
收藏
页码:211 / 215
页数:5
相关论文
共 50 条
  • [41] Trustworthy Software Development - practical view of security processes through MVP methodology
    Chen Shiang-Jiun
    Pan Yu-Chun
    Ma Yi-Wei
    Chiang Cheng-Mou
    Tsai Chi-Chin
    2022 24TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT): ARITIFLCIAL INTELLIGENCE TECHNOLOGIES TOWARD CYBERSECURITY, 2022, : 412 - +
  • [42] Enhancing the Security of Software-Defined Networking through Forensic Memory Analysis
    Lemos, Filipe Augusto da Luz
    Cavali, Thiago dos Santos
    Fonseca, Keiko Veronica Ono
    Fonseca, Mauro Sergio Pereira
    de Faria, Rubens Alexandre
    JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2024, 32 (04)
  • [43] The FormAI Dataset: Generative AI in Software Security through the Lens of Formal Verification
    Tihanyi, Norbert
    Bisztray, Tamas
    Jain, Ridhi
    Ferrag, Mohamed Amine
    Cordeiro, Lucas C.
    Mavroeidis, Vasileios
    PROCEEDINGS OF THE 19TH INTERNATIONAL CONFERENCE ON PREDICTIVE MODELS AND DATA ANALYTICS IN SOFTWARE ENGINEERING, PROMISE 2023, 2023, : 33 - 43
  • [44] Testing for software security
    Thompson, HH
    Whittaker, JA
    DR DOBBS JOURNAL, 2002, 27 (11): : 24 - +
  • [45] Identifying emerging security concepts using Software artifacts through an experimental case
    Marquez, Gaston
    Silva, Paulina
    Noel, Rene
    Matalonga, Santiago
    Astudillo, Hernan
    2015 34TH INTERNATIONAL CONFERENCE OF THE CHILEAN COMPUTER SCIENCE SOCIETY (SCCC), 2015,
  • [46] Prioritizing Countermeasures through the Countermeasure Method for Software Security (CM-Sec)
    Baca, Dejan
    Petersen, Kai
    PRODUCT-FOCUSED SOFTWARE PROCESS IMPROVEMENT, 2010, 6156 : 176 - 190
  • [47] A portal for software security
    Mead, NR
    McGraw, G
    IEEE SECURITY & PRIVACY, 2005, 3 (04) : 75 - 79
  • [48] Software assurance for security
    McGraw, G
    COMPUTER, 1999, 32 (04) : 103 - 105
  • [49] Teaching software-defined network security through malicious tenant detection
    Abazari, Farzaneh
    Esposito, Flavio
    Takabi, Hassan
    Hosseinvand, Hamid
    Pecorella, Tommaso
    INTERNET TECHNOLOGY LETTERS, 2019, 2 (06)
  • [50] Embedded Software Security through Key-Based Control Flow Obfuscation
    Chakraborty, Rajat Subhra
    Narasimhan, Seetharam
    Bhunia, Swarup
    SECURITY ASPECTS IN INFORMATION TECHNOLOGY, 2011, 7011 : 30 - +