System survivability through security bug tolerance

C. Pu, Crispin Cowan
{"title":"System survivability through security bug tolerance","authors":"C. Pu, Crispin Cowan","doi":"10.1109/HASE.1998.731601","DOIUrl":null,"url":null,"abstract":"Summary form only given. A traditional approach to system security is the construction of entirely new software that satisfy well defined security properties. However, the market pressure towards features seems to make such approach infeasible in the near term. Increasingly, commercial off-the-shelf software such as Windows NT is being used in mission critical information infrastructures. Therefore, alternative means must be found to protect large commercial software from attack. We present the security bug tolerance approach as an alternative to building highly secure software from scratch. Security bug tolerance accepts the idea that critical system software will contain vulnerabilities in the form of exploitable bugs, and seeks effective means to prevent these bugs from being exploited efficiently by attackers. We present a categorization scheme for security bug tolerance techniques, and populate it with techniques of our own and from the literature. The categorization is powerful enough to analyze and compare the similarities and differences of relatively diverse techniques such as firewalls, program type checking, and \"security through obscurity\". The goal of security bug tolerance techniques is system survivability (e.g., graceful degradation of system functionality or performance in the presence of attacks) in contrast to complete system security. Instead of ferreting out all potential vulnerabilities using the broad array of accepted techniques, such as formal methods and fault injection, we study means to stop and slow down attacks when they occur.","PeriodicalId":340424,"journal":{"name":"Proceedings Third IEEE International High-Assurance Systems Engineering Symposium (Cat. No.98EX231)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1998-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings Third IEEE International High-Assurance Systems Engineering Symposium (Cat. No.98EX231)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/HASE.1998.731601","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Summary form only given. A traditional approach to system security is the construction of entirely new software that satisfy well defined security properties. However, the market pressure towards features seems to make such approach infeasible in the near term. Increasingly, commercial off-the-shelf software such as Windows NT is being used in mission critical information infrastructures. Therefore, alternative means must be found to protect large commercial software from attack. We present the security bug tolerance approach as an alternative to building highly secure software from scratch. Security bug tolerance accepts the idea that critical system software will contain vulnerabilities in the form of exploitable bugs, and seeks effective means to prevent these bugs from being exploited efficiently by attackers. We present a categorization scheme for security bug tolerance techniques, and populate it with techniques of our own and from the literature. The categorization is powerful enough to analyze and compare the similarities and differences of relatively diverse techniques such as firewalls, program type checking, and "security through obscurity". The goal of security bug tolerance techniques is system survivability (e.g., graceful degradation of system functionality or performance in the presence of attacks) in contrast to complete system security. Instead of ferreting out all potential vulnerabilities using the broad array of accepted techniques, such as formal methods and fault injection, we study means to stop and slow down attacks when they occur.
通过安全错误容忍度实现的系统生存性
只提供摘要形式。系统安全的传统方法是构建满足良好定义的安全属性的全新软件。然而,市场对功能的压力似乎使这种方法在短期内不可行。越来越多的商业现成软件,如Windows NT,正在关键任务信息基础设施中使用。因此,必须找到替代方法来保护大型商业软件免受攻击。我们提出了安全错误容忍方法,作为从头开始构建高度安全软件的替代方法。安全bug容忍接受这样一种观点,即关键系统软件将包含可利用的bug形式的漏洞,并寻求有效的方法来防止这些bug被攻击者有效地利用。我们提出了一个安全漏洞容忍技术的分类方案,并用我们自己的技术和文献中的技术填充它。分类功能非常强大,可以分析和比较相对不同的技术(如防火墙、程序类型检查和“通过隐藏实现安全”)的异同。安全bug容忍技术的目标是系统的生存性(例如,在存在攻击时系统功能或性能的优雅退化),而不是完整的系统安全性。我们不是使用广泛的公认技术(如形式化方法和故障注入)找出所有潜在的漏洞,而是研究在攻击发生时阻止和减缓攻击的方法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信