MIT researchers have developed a new security method, “Oreo,” to protect hardware from cyberattacks.
Hackers use microarchitectural side attacks to find patterns in memory access. Once they locate key program instructions, they can steal passwords or take control of systems.
Address Space Layout Randomization (ASLR) tries to stop this by scattering code randomly. But attackers have found ways to track it down. MIT’s new method, Oreo, solves this problem by making code footprints disappear.
How Oreo Enhances Security
Oreo adds a third layer of protection between virtual and physical memory. This “masked address space” hides program locations, making it harder for hackers to trace them.
MIT Ph.D. student Shixin Song says the idea came from Oreo cookies. Just like the white filling hides the cookie layers, their method erases digital traces before attackers can find them.
Tested and Proven on Linux
Researchers tested Oreo on Linux using gem5, a tool for simulating hardware attacks. Results showed that Oreo stopped side attacks without slowing down performance.
“Oreo is a lightweight security upgrade,” says Song. “It only needs a few extra storage units and has little impact on software speed.”
What’s Next for Oreo?
MIT researchers will present their findings at the Network and Distributed System Security Symposium this month.
Next, they plan to strengthen Oreo against speculative execution attacks, like the Meltdown and Spectre breaches of 2018. They believe Oreo could also help secure crypto libraries, which protect cloud storage and online communications.
With cyber threats rising, Oreo offers a simple but powerful way to boost system security without slowing performance.