Exploits Mitigation Techniques presented at SyScan 2004

by Theo de Raadt,

Tags: Security Auditing

Summary : OpenBSD has been auditing software for nearly 10 years, and while we have had significant success,
it is clearly not enough. In the last 3 years a new view on preventing attacks has surfaced in the
mindset of our group.A software exploit author starts by finding an interesting bug. Writing an exploit is easy because
he can rely on a variety of system behaviours, which are very deterministic. Many of these behaviours
are not required for proper operation. Recently we have developed many new techniques, which combine
to thwart the attacker, without affecting regular software. We make the Unix process environment
difficult to attack much like filling a house full of a variety of burglar traps.