Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where David Bigelow is active.

Publication


Featured researches published by David Bigelow.


computer and communications security | 2015

Timely Rerandomization for Mitigating Memory Disclosures

David Bigelow; Thomas Hobson; Robert Rudd; William W. Streilein; Hamed Okhravi

Address Space Layout Randomization (ASLR) can increase the cost of exploiting memory corruption vulnerabilities. One major weakness of ASLR is that it assumes the secrecy of memory addresses and is thus ineffective in the face of memory disclosure vulnerabilities. Even fine-grained variants of ASLR are shown to be ineffective against memory disclosures. In this paper we present an approach that synchronizes randomization with potential runtime disclosure. By applying rerandomization to the memory layout of a process every time it generates an output, our approach renders disclosures stale by the time they can be used by attackers to hijack control flow. We have developed a fully functioning prototype for x86_64 C programs by extending the Linux kernel, GCC, and the libc dynamic linker. The prototype operates on C source code and recompiles programs with a set of augmented information required to track pointer locations and support runtime rerandomization. Using this augmented information we dynamically relocate code segments and update code pointer values during runtime. Our evaluation on the SPEC CPU2006 benchmark, along with other applications, show that our technique incurs a very low performance overhead (2.1% on average).


Proceedings of the First ACM Workshop on Moving Target Defense | 2014

On the Challenges of Effective Movement

Thomas Hobson; Hamed Okhravi; David Bigelow; Robert Rudd; William W. Streilein

Moving Target (MT) defenses have been proposed as a game-changing approach to rebalance the security landscape in favor of the defender. MT techniques make systems less deterministic, less static, and less homogeneous in order to increase the level of effort required to achieve a successful compromise. However, a number of challenges in achieving effective movement lead to weaknesses in MT techniques that can often be used by the attackers to bypass or otherwise nullify the impact of that movement. In this paper, we propose that these challenges can be grouped into three main types: coverage, unpredictability, and timeliness. We provide a description of these challenges and study how they impact prominent MT techniques. We also discuss a number of other considerations faced when designing and deploying MT defenses.


annual computer security applications conference | 2017

QUASAR: Quantitative Attack Space Analysis and Reasoning

Richard Skowyra; Steven R. Gomez; David Bigelow; James W. Landry; Hamed Okhravi

Computer security has long been an arms race between attacks and defenses. While new defenses are proposed and built to stop specific vectors of attacks, novel, sophisticated attacks are devised by attackers to bypass them. This rapid cycle of defenses and attacks has made it difficult to strategically reason about the protection offered by each defensive technique, the coverage of a set of defenses, and possible new vectors of attack for which to design future defenses. In this work, we present QUASAR, a framework that systematically analyzes attacks and defenses at the granularity of the capabilities necessary to mount the attacks. We build a model of attacks in the memory corruption domain, and represent various prominent defenses in this domain. We demonstrate that QUASAR can be used to compare defenses at a fundamental level (what they do instead of how they do it), reason about the coverage of a defensive configuration, and hypothesize about possible new attack strategies. We show that of the top five hypothesized new attack strategies, in fact, four have been published in security venues over the past two years. We investigate the fifth hypothesized vector ourselves and demonstrate that it is, in fact, a viable vector of attack.


ieee symposium on security and privacy | 2014

Finding Focus in the Blur of Moving-Target Techniques

Hamed Okhravi; Thomas Hobson; David Bigelow; William W. Streilein


network and distributed system security symposium | 2017

Address Oblivious Code Reuse: On the Effectiveness of Leakage Resilient Diversity.

Robert Rudd; Richard Skowyra; David Bigelow; Veer Dedhia; Thomas Hobson; Stephen Crane; Christopher Liebchen; Per Larsen; Lucas Davi; Michael Franz; Ahmad-Reza Sadeghi; Hamed Okhravi


Archive | 2018

Survey of Cyber Moving Targets Second Edition

Bryan C. Ward; Steven R. Gomez; Richard Skowyra; David Bigelow; Jason Martin; James W. Landry; Hamed Okhravi


Archive | 2018

DYNAMIC FLOW SYSTEM

Thomas Hobson; William W. Streilein; Hamed Okhravi; Richard Skowyra; Kevin Bauer; Veer Dedhia; David Bigelow


Archive | 2018

TIMELY ADDRESS SPACE RANDOMIZATION

Hamed Okhravi; Thomas Hobson; David Bigelow; Robert Rudd; William W. Streilein


usenix security symposium | 2017

Identifier Binding Attacks and Defenses in Software-Defined Networks.

Samuel Jero; William Koch; Richard Skowyra; Hamed Okhravi; Cristina Nita-Rotaru; David Bigelow


Archive | 2016

Hide and Seek: Exploiting and Hardening Leakage-Resilient Code Randomization

Hamed Okhravi; Robert Rudd; David Bigelow; Richard Skowyra; Veer Dedhia; Thomas Hobson; Stephen Crane; Christopher Liebchen; Per Larsen; Lucas Davi; Michael Franz; Ahmad-Reza Sadeghi

Collaboration


Dive into the David Bigelow's collaboration.

Top Co-Authors

Avatar

Hamed Okhravi

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Thomas Hobson

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Robert Rudd

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

William W. Streilein

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Veer Dedhia

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Michael Franz

University of California

View shared research outputs
Top Co-Authors

Avatar

Per Larsen

University of California

View shared research outputs
Top Co-Authors

Avatar

Stephen Crane

University of California

View shared research outputs
Top Co-Authors

Avatar

Ahmad-Reza Sadeghi

Technische Universität Darmstadt

View shared research outputs
Researchain Logo
Decentralizing Knowledge