Affiliation:
1. University of Wisconsin-Madison, Madison WI
Abstract
Writes via unchecked pointer dereferences rank high among vulnerabilities most often exploited by malicious code. The most common attacks use an unchecked string copy to cause a buffer overrun, thereby overwriting the return address in the function's activation record. Then, when the function "returns", control is actually transferred to the attacker's code. Other attacks may overwrite function pointers, setjmp buffers, system-call arguments, or simply corrupt data to cause a denial of service.A number of techniques have been proposed to address such attacks. Some are limited to protecting the return address only; others are more general, but have undesirable properties such as having a high runtime overhead, requiring manual changes to the source code, or forcing programmers to give up control of data representations and memory management.This paper describes the design and implementation of a security tool for C programs that addresses all these issues: it has a low runtime overhead, does not require source code modification by the programmer, does not report false positives, and provides protection against a wide range of attacks via bad pointer dereferences, including but not limited to buffer overruns and attempts to access previously freed memory. The tool uses static analysis to identify potentially dangerous pointer dereferences, and memory locations that are legitimate targets of these pointers. Dynamic checks are then inserted; if at runtime the target of an unsafe dereference is not in the legitimate set, a potential security violation is reported, and the program is halted.
Publisher
Association for Computing Machinery (ACM)
Cited by
37 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. RTT-UAF: Reuse Time Tracking for Use-After-Free Detection;Proceedings of the 38th ACM International Conference on Supercomputing;2024-05-30
2. A Smart Status Based Monitoring Algorithm for the Dynamic Analysis of Memory Safety;ACM Transactions on Software Engineering and Methodology;2023-12-11
3. A Source-Level Instrumentation Framework for the Dynamic Analysis of Memory Safety;IEEE Transactions on Software Engineering;2023-04-01
4. Exploitation Techniques for Data-oriented Attacks with Existing and Potential Defense Approaches;ACM Transactions on Privacy and Security;2021-11-30
5. Runtime detection of memory errors with smart status;Proceedings of the 30th ACM SIGSOFT International Symposium on Software Testing and Analysis;2021-07-11