Modern field guide to security and privacy

MIT's CodePhage helps computers automatically detect, devour their own bugs

Massachusetts Institute of Technology researchers presented a system to detect bugs in programs as they run and repair them by borrowing functionality from other applications.

|
Andrew Kelly / Reuters

Researchers from Massachusetts Institute of Technology say they've developed a way to automatically find and fix one of the most common types of software bugs without even seeing a program's source code. Instead, it detects glitches as programs run, and repairs them by borrowing functionality from other applications. 

"It’s actually surprising that it works," says Emery Berger, a University of Massachusetts at Amherst professor who served on the review committee at the mid-June Association for Computing Machinery conference where the repair system, dubbed CodePhage, debuted.

The bug, known as a buffer overflow, has been a nuisance for programmers and security professionals for decades. It was the heart of malware and vulnerabilities ranging from the famous Morris Worm in the 1980s to widely publicized exploits named Venom and Ghost this year. Depending on how and where an overflow is used, it could theoretically give an attacker complete control over a system. 

The flaw happens when more data is directed to a block of memory than it can handle – and, therefore, it overflows. The extra data overwrites whatever is stored in the next block of memory. That could mean changing information used in a program or adding in commands to run malicious programs. 

When an overflow occurs, the CodePhage system searches public archives of open source software for a program that handles the same type of data without overflowing. It then adapts the data entry portion of the working program into a patch for the broken one. In CodePhage's designers' jargon, it finds a "donor" for the ailing application.

Still, finding a compatible program is a challenge. Most software isn't designed using interchangeable parts. Similar segments of different programs can be wildly different — they can use different names, different parameters, and incorporate different functionalities.

"It's a lot like playing hide-and-go-seek in the dark and not knowing who else is playing the game," says MIT computer science Prof. Martin Rinard, who worked on the team at MIT's Computer Science and Artificial Intelligence Laboratory headed by research scientist Stelios Sidiroglou-Douskos.

CodePhage evaluates exactly what code to take from a donor by tracing the path of input data as it works its way into a computer's memory. 

Dr. Rinard hopes that automating the detection and patching processes will reduce the chance that an attacker can take advantage of the bug within a system. "One of the biggest problems is the significant delay after discovering a vulnerability until it’s patched,” he says. CodePhage makes the patching process much faster, Rinard says, because it "takes the human out of the process.”

That's critical because, while many operating systems and programming languages have gotten better about handling buffer overflows, problems remain incredibly common, says Amol Sarwate, director of vulnerability research at Qualys, a security firm that discovered the vulnerability known as Ghost that was caused by a buffer overflow problem. 

"If [CodePhage] could get rid of buffer overflows,” says Mr. Sarwate, “it would get rid of the majority of headaches for people who defend networks.”

CodePhage is still only a lab-tested prototype, notes Professor Berger from the UMAss and with the complexities of code, problems could arise as it is used at the scale of a production product. Still, he's optimistic it can succeed. So are the scientists at MIT CSAIL, who believe they can adapt CodePhage to be used for any situation where coders make mistakes, even less critical ones such as writing inefficient code.

 

You've read  of  free articles. Subscribe to continue.
Real news can be honest, hopeful, credible, constructive.
What is the Monitor difference? Tackling the tough headlines – with humanity. Listening to sources – with respect. Seeing the story that others are missing by reporting what so often gets overlooked: the values that connect us. That’s Monitor reporting – news that changes how you see the world.

Dear Reader,

About a year ago, I happened upon this statement about the Monitor in the Harvard Business Review – under the charming heading of “do things that don’t interest you”:

“Many things that end up” being meaningful, writes social scientist Joseph Grenny, “have come from conference workshops, articles, or online videos that began as a chore and ended with an insight. My work in Kenya, for example, was heavily influenced by a Christian Science Monitor article I had forced myself to read 10 years earlier. Sometimes, we call things ‘boring’ simply because they lie outside the box we are currently in.”

If you were to come up with a punchline to a joke about the Monitor, that would probably be it. We’re seen as being global, fair, insightful, and perhaps a bit too earnest. We’re the bran muffin of journalism.

But you know what? We change lives. And I’m going to argue that we change lives precisely because we force open that too-small box that most human beings think they live in.

The Monitor is a peculiar little publication that’s hard for the world to figure out. We’re run by a church, but we’re not only for church members and we’re not about converting people. We’re known as being fair even as the world becomes as polarized as at any time since the newspaper’s founding in 1908.

We have a mission beyond circulation, we want to bridge divides. We’re about kicking down the door of thought everywhere and saying, “You are bigger and more capable than you realize. And we can prove it.”

If you’re looking for bran muffin journalism, you can subscribe to the Monitor for $15. You’ll get the Monitor Weekly magazine, the Monitor Daily email, and unlimited access to CSMonitor.com.

QR Code to MIT's CodePhage helps computers automatically detect, devour their own bugs
Read this article in
https://www.csmonitor.com/World/Passcode/2015/0710/MIT-s-CodePhage-helps-computers-automatically-detect-devour-their-own-bugs
QR Code to Subscription page
Start your subscription today
https://www.csmonitor.com/subscribe