Beyond Planted Bugs in "Trusting Trust": The Input-Processing Frontier

نویسندگان

  • Sergey Bratus
  • Trey Darley
  • Michael E. Locasto
  • Meredith L. Patterson
  • Rebecca Shapiro
  • Anna Shubina
چکیده

It’s been nearly thirty years from Ken Thompson’s “Reflections on Trusting Trust” and its famous verdict that “You can’t trust code that you did not totally create yourself.” If there is one practical lesson that the Internet taught us since then, it is that one cannot even trust one’s own code so long as that code meets arbitrary inputs from the Internet. Sooner or later a mixture of bugs or features turns the connected code into an execution engine for hostile inputs – indeed, it was sooner rather than later for the original Internet daemons. Over time, exploitable bugs became more complex, exploit payloads more sophisticated. Their composition first showed aspects of an art and then of a solid engineering process. Still, with a few exceptions, code connected to the Internet cannot be trusted. Even though everything Thompson predicted, including well-placed microcode bugs, has come to pass, there seems to be no need for a malicious entity to insert bugs into the software most of us use daily on the Internet. The input-subvertible bugs are already there. When a mechanism used for subversion is dealt with (as happened to the executable stack and predictable uniform address space layout), bugs simply seem to migrate to another protocol or layer. Input is still just as dangerous as it was for early implementations of SMTP and DNS.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Effect of Relocation and Rotation on Radial Efficiency Scores for a Partially Negative Data Problem

   Negative data handling has gained a remarkable importance in the literature of Data Envelopment Analysis (DEA) to address many real life problems. Various erstwhile applications, in this arena, referred relocation of the origin to a superior (RDM) or to an inferior (Translated Input Oriented BCC) neighboring point. In this paper, the conditions for Rotation Invariance of various Data Envelop...

متن کامل

Running head: DEVELOPING TRUST: FIRST IMPRESSIONS AND EXPERIENCE 1 Developing Trust: First Impressions and Experience

Using the repeated Trust Game, we investigated how first impressions and experience affect trusting dispositions, beliefs, and behaviors. As in previous research, trusting beliefs and trust-related behaviors were greater at the start of the game for partners with trustworthy faces; and higher later in the game for partners who reciprocated. Three additional findings extended beyond the previous...

متن کامل

Erosion of Trust in the Medical Profession in India: Time for Doctors to Act

In India, over the last decade, a series of stewardship failures in the health system, particularly in the medical profession, have led to a massive erosion of trust in these institutions. In many low- and middle-income countries (LMICs), the situation is similar and has reached crisis proportions; this crisis requires urgent attention. This paper draws on the insights from the recent developme...

متن کامل

Analyzing Stripped Device-Driver Executables

This paper sketches the design and implementation of DeviceDriver Analyzer for x86 (DDA/x86), a prototype analysis tool for finding bugs in stripped Windows device-driver executables (i.e., when neither source code nor symbol-table/debugging information is available), and presents a case study. DDA/x86 was able to find known bugs (previously discovered by source-code-based analysis tools) along...

متن کامل

Study on Trusting Relationship in Complex Network

In order to find the information dissemination rules in the social network, trusting relationship is proposed from a view of the influences of the members in a complex network. The basic metric, trusting value is defined to measure trusting degree between individuals in the network. A greedy algorithm with O(n) time complexity is designed to calculate trusting values of all node pairs. Accordin...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IEEE Security & Privacy

دوره 12  شماره 

صفحات  -

تاریخ انتشار 2014