Mechanism for characterizing soft failures in systems under attack
First Claim
Patent Images
1. A method for characterizing system security of a device under analysis (DUA), comprising:
- sending a plurality of test messages to attack the DUA;
sending a plurality of instrumentation commands to the DUA, the sending of the plurality of instrumentation commands interleaved with the sending of the plurality of test messages;
measuring response times for the DUA to successfully respond to each of the plurality of instrumentation commands;
responsive to observing no response from the DUA to one of the plurality of instrumentation commands for a predetermined period of time;
restarting the DUA, andresending test messages sent to the DUA prior to sending the one of the plurality of instrumentation commands that receives no response;
responsive to the DUA sending a message indicating system busy in response to a second one of the plurality of instrumentation commands, resending the second one of the plurality of instrumentation commands to the DUA; and
characterizing the system security based, at least in part, on the measured response times.
3 Assignments
0 Petitions
Accused Products
Abstract
A system and method to identify and characterize nonfatal failures of a device-under-analysis (DUA). A security analyzer executes attacks to test the security of the DUA. During the attacks, the security analyzer periodically sends an instrumentation command to the DUA and measures the time the DUA takes to successfully respond to the instrumentation command (the response time sample). The security analyzer uses the response time samples to identify and/or characterize the nonfatal failures in the DUA caused by the attacks.
36 Citations
27 Claims
-
1. A method for characterizing system security of a device under analysis (DUA), comprising:
-
sending a plurality of test messages to attack the DUA; sending a plurality of instrumentation commands to the DUA, the sending of the plurality of instrumentation commands interleaved with the sending of the plurality of test messages; measuring response times for the DUA to successfully respond to each of the plurality of instrumentation commands; responsive to observing no response from the DUA to one of the plurality of instrumentation commands for a predetermined period of time; restarting the DUA, and resending test messages sent to the DUA prior to sending the one of the plurality of instrumentation commands that receives no response; responsive to the DUA sending a message indicating system busy in response to a second one of the plurality of instrumentation commands, resending the second one of the plurality of instrumentation commands to the DUA; and characterizing the system security based, at least in part, on the measured response times. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A security analyzer for characterizing system security of a device under analysis (DUA), comprising:
-
means for sending a plurality of test messages to attack the DUA; means for sending a plurality of instrumentation commands to the DUA, the sending of the plurality of instrumentation commands interleaved with the sending of the plurality of test messages; means for measuring response times for the DUA to successfully respond to each of the plurality of instrumentation commands; means, responsive to observing no response from the DUA to one of the plurality of instrumentation commands for a predetermined period of time, for restarting the DUA, and resending test messages sent to the DUA prior to sending the one of the plurality of instrumentation commands that receives no response; means, responsive to the DUA sending a message indicating system busy in response to a second one of the plurality of instrumentation commands, for resending the second one of the plurality of instrumentation commands to the DUA; and means for characterizing the system security based, at least in part, on the measured response times. - View Dependent Claims (15, 16)
-
-
17. A computer program product for use in conjunction with a computer system, the computer program product comprising a non-transitory computer readable storage medium and a computer program mechanism embedded therein, the computer program mechanism comprising:
-
instructions for sending a plurality of test messages to attack a DUA; instructions for sending a plurality of instrumentation commands to the DUA, the sending of the plurality of instrumentation commands interleaved with the sending of the plurality of test messages; instructions for measuring response times for the DUA to successfully respond to each of the plurality of instrumentation commands; instructions for, responsive to observing no response from the DUA to one of the plurality of instrumentation commands for a predetermined period of time; restarting the DUA, and resending test messages sent to the DUA prior to sending the one of the plurality of instrumentation commands that receives no response; instructions for, responsive to the DUA sending a message indicating system busy in response to a second one of the plurality of instrumentation commands, resending the second one of the plurality of instrumentation commands to the DUA; and instructions for characterizing the system security based, at least in part, on the measured response times. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25, 26, 27)
-
Specification