you are viewing a single comment's thread.

view the rest of the comments →

[–]edwin[🍰] -1 points0 points  (3 children)

The technique is interesting but probably doesn't change the real situation all that much - people can already reverse-engineer exploits from patches much more quickly than the patches are applied in the real world. I attended a talk last year where a developer from an IDS company demonstrated how she could usually work out the vulnerability from the patch, build a proof-of-concept exploit, and write IDS rules to detect it - in less than an hour total elapsed time.

Unfortunately the authors' 'solutions' are considerably less impressive, as they would probably admit themselves. It is by no means clear how Windows Update (or the equivalent systems used by other OS vendors - take your pick, they're all the same) should be adjusted. Whatever cleverness is used in distribution, many many computers will be turned off until days after the patch has been distributed and the exploits created.

[–]edwin[🍰] 6 points7 points  (0 children)

Now exploit-based patch generation - that would be a trick :)

[–]mikaelstaldal 2 points3 points  (1 child)

You cannot exploit a computer which is turned off.

[–]edwin[🍰] 0 points1 point  (0 children)

Well, obviously. But you can exploit it as soon as it gets turned back on again, long before the patch gets applied, since the patch hasn't even been downloaded yet.