Date of Award
12-2018
Document Type
Dissertation
Degree Name
Doctor of Philosophy (PhD)
Department
Computer Engineering and Sciences
First Advisor
William Allen
Second Advisor
Shengzhi Zhang
Third Advisor
Muzaffar Shaikh
Fourth Advisor
Philip Bernhard
Abstract
In this dissertation, we address the problem of weakness of address space layout randomization. The address space randomization technique was proposed to make determining the address of a shared library more difficult since each instance of the program is loaded into a random base address. However, when address space randomization layout (ASLR) is implemented on a 32-bit system, an attacker can use a brute force attack to guess the address of the shared library.The main goal of the research described in this dissertation is to study the use of a dispatching algorithm and multiple back-end servers as a moving target defense technique to mitigate ASLR weaknesses. In this dissertation, we present a probabilistic model for three types of attacks. First, we present a brute force attack when the number of servers is known. Second, we present a brute force attack when the number of servers is unknown. Then, we present the probability of the attacker’s success on both of the attacks. Second, we implement a system to mitigate those attacks, to measure the effect of implementing these defenses on performance, and to measure its effect on throughput, response time and CPU utilization. Finally, we analyze how the moving target defense helps in distributing the attack and increasing the attack surface. We demonstrate how increasing the attack surface affects system performance.
Recommended Citation
Aldossary, Sultan M., "Mitigating Memory Randomization Weaknesses via Moving Target Defense" (2018). Theses and Dissertations. 907.
https://repository.fit.edu/etd/907