SecMVX: Analysis on the vulnerability of multi-variant execution

As an active defenses technique, multivariant execution(MVX) can detect attacks by monitoring the consistency of heterogeneous variants with parallel execution. Compared with patch-style passive defense, MVX can defend against known and even unknown vulnerability-based attacks without relying on att...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:China communications 2021-08, Vol.18 (8), p.85-95
Hauptverfasser: Li, Bingzheng, Zhang, Zheng, Wang, Xiaomei, Qu, Sheng, Wu, Jiangxing
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:As an active defenses technique, multivariant execution(MVX) can detect attacks by monitoring the consistency of heterogeneous variants with parallel execution. Compared with patch-style passive defense, MVX can defend against known and even unknown vulnerability-based attacks without relying on attack feature information. However, variants generated with software diversity technologies will introduce new vulnerabilities when they execute in parallel. First, we analyze the security of MVX theory from the perspective of formal description. Then we summarize the general forms and techniques for attacks against MVX, and analyze the new vulnerabilities arising from the combination of variant generation technologies. We propose SecMVX, a secure MVX architecture and variant generation technology. Experimental evaluations based on CVEs and SPEC 2006 benchmark show that SecMVX introduces 11.29% of the average time overhead, and avoids vulnerabilities caused by the improper combination of variant generation technologies while keeping the defensive ability of MVX.
ISSN:1673-5447
DOI:10.23919/JCC.2021.08.007