Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×

The Biology of Network Security 85

Bob Brown writes "A University of New Mexico researcher is taking lessons from biology and using them to try to stymie hackers and viruses. Projects such as RISE attempt to secure computers and networks by promoting application diversity." From the article: "Diversity of systems and applications can play a key role in safeguarding computers and networks from malicious attacks, Forrest said. Her team published a paper last year on a system dubbed RISE (Randomized Instruction Set Emulation) (PDF) that randomizes an application's machine code to stymie would-be attacks, such as those launched via binary code injection."
This discussion has been archived. No new comments can be posted.

The Biology of Network Security

Comments Filter:
  • Intel not so happy (Score:4, Interesting)

    by TubeSteak ( 669689 ) on Tuesday April 25, 2006 @03:06PM (#15199110) Journal
    She said this idea didn't fly very well with hardware engineers at Intel with whom she spoke to last year, as they envisioned having to build different chips around all these different instruction sets. Forrest's team got around this issue by building its technology atop virtual machine software dubbed Valgrind that she said provided flexibility because it is open source but that is not as efficient as she would have liked.
    I imagine that Palladium style code checking wouldn't be to happy with programs that did funny things like this. I could be wrong, but off the top of my head, it seems plausible.

    As for mutation aka polymorphism (she talks about this at the end of TFA), doesn't she know about virii having built-in mutators? And metamorphic code does almost the exact same thing she's talking about in RISE.
  • by Anonymous Coward on Tuesday April 25, 2006 @03:15PM (#15199178)
    Marcus Ranum's opinion
    -----------------------
    Monoculture Hype Alert!
    NSF Grants Two Universities $750,000 to Study Computer Monocultures (25 November 2003)
    With the help of a $750,000 National Science Foundation grant, Carnegie Mellon University and the University of New Mexico will study computer "monocultures" and the benefits of diverse computing environments. "The researchers intend to create an application that could generate diversity in key aspects of software programs, thus making the same vulnerability less effective as a means of attack against the population as a whole."
    $750,000 to sit around and whine about Microsoft? How do I get a gig like that?!

    The Myth of Monoculture
    Recently, my friends Dan Geer and Bruce Schneier (along with other smart people) published a paper postulating that our computing environments are at risk of security disasters because of a "Microsoft Monoculture." This paper has gotten a tremendous amount of attention lately. Unfortunately, I think that many of the papers' proponents have forgotten that the paper is an analogy and not real science. Arguing by analogy is illuminating but also distracting.

    See link below for the full opinion on "The Myth of Monoculture".

    http://www.ranum.com/security/computer_security/ed itorials/monoculture-hype/index.html [ranum.com]
  • by RexRhino ( 769423 ) on Tuesday April 25, 2006 @04:47PM (#15200059)
    You could compile your source code to some sort of abstracted binary code (similiar to a java virtual machine), and then compile that into your real machine code on the local machine.

"I've seen it. It's rubbish." -- Marvin the Paranoid Android

Working...