Software And Hardware Methods For Multi-Variant Parallel Program Execution To Detect, Quarantine And Repair Malicious Code Injection

Tech ID: 20813 / UC Case 2007-624-0

Brief Description

In its simplest form this invention consists of a novel software-only approach to malicious code detection and repair in real time. However by including a minute extra component (< 0.001% total transistor count) to a standard commercial processor this process can enable fully automatic repair of malicious code injections.

Full Description

Researcher’s at UCI Department of Computer Science’s  Secure Systems and Software Laboratory have developed a fundamentally new software and hardware approach to security called “multi-variant code execution”. Instead of endlessly attempting to eliminate vulnerabilities (having accepted that inevitability) they merely ensure that these vulnerabilities can never be exploited.

The principal idea is to run several slightly different instances of the same program that are otherwise identical, in lockstep, on multiple disjoint processing elements. A monitoring layer compares the states of the different computations at regular intervals or checkpoints and flags an error if they differ. A malicious intruder would need to devise a different attack vector for each of the program instances running concurrently and would need to corrupt all of the concurrent processes between checkpoints to avoid detection. An attack vector that is designed to corrupt one of the processes will cause “collateral” data modifications in the other processes and if the variable layout differs between the two program variants, which it will, it becomes extremely difficult to devise an absolutely symmetric attack that corrupts both (or many) program instances while simultaneously producing semantically identical collateral effects.

Multi-variant code execution is a disruptive technology that eliminates a wide range of malware threats such as “zero-day” attacks and sophisticated polymorphic and metamorphic viruses and worms.

Suggested uses

Computer security

Advantages

More secure, faster, inexpensive, zero cost to end user

State Of Development

Patent pending

Patent Status

Country Type Number Dated Case
United States Of America Issued Patent 8,239,836 08/07/2012 2007-624
 

Contact

Learn About UC TechAlerts - Save Searches and receive new technology matches

Other Information

Categorized As

  • AN INTEGRAL PART OF
  • Institute for Innovation Logo
  • Institute for Innovation Logo

University of California, Irvine Invention Transfer Group
5141 California Avenue, Suite 200, Irvine,CA 92697-7700
Tel: 949.824.2683 | Fax: 949.824.3880
www.ota.uci.edu | ota@uci.edu

© 2010 - 2012, The Regents of the University of California
Terms of use | Privacy Notice