Software diversity explained

Software diversity is a research field about the comprehension and engineering of diversity in the context of software.

Areas

The different areas of software diversity are discussed in surveys on diversity for fault-tolerance[1] or for security.[2]

The main areas are:

Techniques

Code transformations

It is possible to amplify software diversity through automated transformation processes that create synthetic diversity. A "multicompiler" is compiler embedding a diversification engine.[4] A multi-variant execution environment (MVEE) is responsible for selecting the variant to execute and compare the output.

Fred Cohen was among the very early promoters of such an approach. He proposed a series of rewriting and code reordering transformations that aim at producing massive quantities of different versions of operating systems functions.[5] These ideas have been developed over the years and have led to the construction of integrated obfuscation schemes to protect key functions in large software systems.[6]

Another approach to increase software diversity of protection consists in adding randomness in certain core processes, such as memory loading. Randomness implies that all versions of the same program run differently from each other, which in turn creates a diversity of program behaviors. This idea was initially proposed and experimented by Stephanie Forrest and her colleagues.[7]

Recent work on automatic software diversity explores different forms of program transformations that slightly vary the behavior of programs. The goal is to evolve one program into a population of diverse programs that all provide similar services to users, but with a different code.[8] This diversity of code enhances the protection of users against one single attack that could crash all programs at the same time.

Transformation operators include:[9]

Natural software diversity

It is known that some functionalities are available in multiple interchangeable implementations. This natural diversity can be exploited, for example it has been shown valuable to increase security in cloud systems.

References

  1. Book: Deswarte. Y.. Kanoun. K.. Laprie. J.-C.. Proceedings Computer Security, Dependability, and Assurance: From Needs to Solutions (Cat. No.98EX358) . Diversity against accidental and deliberate faults . 171–181. en-US. IEEE Comput. Soc. 10.1109/csda.1998.798364. 978-0769503370. July 1998. 10.1.1.27.9420. 5597924.
  2. Book: Just. James E.. Cornwell. Mark. Proceedings of the 2004 ACM workshop on Rapid malcode . Review and analysis of synthetic diversity for breaking monocultures . 2004-10-29. ACM. 23–32. 10.1145/1029618.1029623. 978-1581139709. 10.1.1.76.3691. 358885.
  3. Schaefer. Ina. Rabiser. Rick. Clarke. Dave. Bettini. Lorenzo. Benavides. David. Botterweck. Goetz. Pathak. Animesh. Trujillo. Salvador. Villela. Karina. 2012-07-28. Software diversity: state of the art and perspectives. International Journal on Software Tools for Technology Transfer. en. 14. 5. 477–495. 10.1007/s10009-012-0253-y. 1433-2779. 10.1.1.645.1960. 7347285.
  4. Web site: Protecting Applications with Automated Software Diversity. 2018-09-10. Galois, Inc.. 2019-02-12.
  5. Cohen. Frederick B.. 1993. Operating system protection through program evolution. Computers & Security. 12. 6. 565–584. 10.1016/0167-4048(93)90054-9. 0167-4048.
  6. Book: Chenxi Wang. Davidson. J.. Hill. J.. Knight. J.. Proceedings International Conference on Dependable Systems and Networks . Protection of software-based survivability mechanisms . https://web.archive.org/web/20170430174552/http://www.dtic.mil/dtic/tr/fulltext/u2/a466288.pdf. live. April 30, 2017. en-US. IEEE Comput. Soc. 193–202. 10.1109/dsn.2001.941405. 978-0769511016. 2001. 10.1.1.1.7416. 15860593.
  7. Book: Forrest. S.. Somayaji. A.. Ackley. D.H.. Proceedings. The Sixth Workshop on Hot Topics in Operating Systems (Cat. No.97TB100133) . Building diverse computer systems . en-US. IEEE Comput. Soc. Press. 67–72. 10.1109/hotos.1997.595185. 978-0818678349. 1997. 10.1.1.131.3961. 1332487.
  8. Schulte. Eric. Fry. Zachary P.. Fast. Ethan. Weimer. Westley. Forrest. Stephanie. 2013-07-28. Software mutational robustness. Genetic Programming and Evolvable Machines. en. 15. 3. 281–312. 10.1007/s10710-013-9195-8. 1389-2576. 1204.4224. 11520214.
  9. Web site: Automated Software Diversity: Sometimes More Isn't Merrier. 2018-09-10. Galois, Inc.. 2019-02-12.