Low Threat Security Patches
Sam Wagstaff - CERIAS
Jan 09, 2002
AbstractSoftware patches implicitly contain vulnerability information that may be abused to jeopardize the security of a system. When a vendor supplies a binary program patch, different users may receive it at different times. The differential application times of the patch create a window of vulnerability until all users have installed the patch. An abuser who receives the patch earlier than some other users might disassemble the binary patch and identify the problem for which the patch has been issued. Armed with this information, he might be able to abuse another user's machine in some way. We discuss several ways that security patches may be made safer. Among the techniques we suggest are: customizing patches to apply to only one machine, disguising patches to hinder their interpretation, synchronizing patch distribution to close the window of vulnerability, applying patches automatically, and using cryptoprocessors with enciphered operating systems.
About the SpeakerBefore coming to Purdue, Professor Wagstaff taught at the Universities of Rochester, Illinois, and Georgia. He spent a year at the Institute for Advanced Study in Princeton. His research interests are in the areas of cryptography, parallel computation, and analysis of algorithms, especially number theoretic algorithms. He and J. W. Smith of the University of Georgia have built a special processor with parallel capability for factoring large integers.
The views, opinions and assumptions expressed in these videos are those of the presenter and do not necessarily reflect the official policy or position of CERIAS or Purdue University. All content included in these videos, are the property of Purdue University, the presenter and/or the presenter’s organization, and protected by U.S. and international copyright laws. The collection, arrangement and assembly of all content in these videos and on the hosting website exclusive property of Purdue University. You may not copy, reproduce, distribute, publish, display, perform, modify, create derivative works, transmit, or in any other way exploit any part of copyrighted material without permission from CERIAS, Purdue University.