• DocumentCode
    3549447
  • Title

    Defeating memory corruption attacks via pointer taintedness detection

  • Author

    Chen, Shuo ; Xu, Jun ; Nakka, Nithin ; Kalbarczyk, Zbigniew ; Iyer, Ravishankar K.

  • Author_Institution
    Dept. of Comput. Sci., Illinois Univ., Urbana, IL, USA
  • fYear
    2005
  • fDate
    28 June-1 July 2005
  • Firstpage
    378
  • Lastpage
    387
  • Abstract
    Most malicious attacks compromise system security through memory corruption exploits. Recently proposed techniques attempt to defeat these attacks by protecting program control data. We have constructed a new class of attacks that can compromise network applications without tampering with any control data. These non-control data attacks represent a new challenge to system security. In this paper, we propose an architectural technique to defeat both control data and non-control data attacks based on the notion of pointer taintedness. A pointer is said to be tainted if user input can be used as the pointer value. A security attack is detected whenever a tainted value is dereferenced during program execution. The proposed architecture is implemented on the SimpleScalar processor simulator and is evaluated using synthetic programs as well as real-world network applications. Our technique can effectively detect both control data and non-control data attacks, and it offers better security coverage than current methods. The proposed architecture is transparent to existing programs.
  • Keywords
    data flow analysis; data integrity; security of data; storage management; SimpleScalar processor simulator; malicious attack; memory corruption; pointer taintedness detection; program control data; program execution; real-world network application; synthetic program; system security; Buffer overflow; Computer viruses; Data security; Hardware; Information security; Program processors; Programming profession; Protection; Web and internet services; Writing; Attack; Hardware Design; Security; Taintedness; Vulnerability;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Dependable Systems and Networks, 2005. DSN 2005. Proceedings. International Conference on
  • Print_ISBN
    0-7695-2282-3
  • Type

    conf

  • DOI
    10.1109/DSN.2005.36
  • Filename
    1467812