DocumentCode :
3549447
Title :
Defeating memory corruption attacks via pointer taintedness detection
Author :
Chen, Shuo ; Xu, Jun ; Nakka, Nithin ; Kalbarczyk, Zbigniew ; Iyer, Ravishankar K.
Author_Institution :
Dept. of Comput. Sci., Illinois Univ., Urbana, IL, USA
fYear :
2005
fDate :
28 June-1 July 2005
Firstpage :
378
Lastpage :
387
Abstract :
Most malicious attacks compromise system security through memory corruption exploits. Recently proposed techniques attempt to defeat these attacks by protecting program control data. We have constructed a new class of attacks that can compromise network applications without tampering with any control data. These non-control data attacks represent a new challenge to system security. In this paper, we propose an architectural technique to defeat both control data and non-control data attacks based on the notion of pointer taintedness. A pointer is said to be tainted if user input can be used as the pointer value. A security attack is detected whenever a tainted value is dereferenced during program execution. The proposed architecture is implemented on the SimpleScalar processor simulator and is evaluated using synthetic programs as well as real-world network applications. Our technique can effectively detect both control data and non-control data attacks, and it offers better security coverage than current methods. The proposed architecture is transparent to existing programs.
Keywords :
data flow analysis; data integrity; security of data; storage management; SimpleScalar processor simulator; malicious attack; memory corruption; pointer taintedness detection; program control data; program execution; real-world network application; synthetic program; system security; Buffer overflow; Computer viruses; Data security; Hardware; Information security; Program processors; Programming profession; Protection; Web and internet services; Writing; Attack; Hardware Design; Security; Taintedness; Vulnerability;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Dependable Systems and Networks, 2005. DSN 2005. Proceedings. International Conference on
Print_ISBN :
0-7695-2282-3
Type :
conf
DOI :
10.1109/DSN.2005.36
Filename :
1467812
Link To Document :
بازگشت