SafeStack: Automatically Patching Stack-Based Buffer Overflow Vulnerabilities

被引:34
作者
Chen, Gang [1 ]
Jin, Hai [1 ]
Zou, Deqing [1 ]
Zhou, Bing Bing [2 ]
Liang, Zhenkai [3 ]
Zheng, Weide [1 ]
Shi, Xuanhua [1 ]
机构
[1] Huazhong Univ Sci & Technol, Cluster & Grid Comp Lab, Serv Comp Technol & Syst Lab, Wuhan 430074, Hubei, Peoples R China
[2] Univ Sydney, Sch Informat Technol, Ctr Distributed & High Performance Comp, Sydney, NSW 2006, Australia
[3] Natl Univ Singapore, Dept Comp Sci, Sch Comp, Singapore 117417, Singapore
基金
中国国家自然科学基金;
关键词
Software reliability; buffer overflow vulnerability diagnosis; attack prevention;
D O I
10.1109/TDSC.2013.25
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Buffer overflow attacks still pose a significant threat to the security and availability of today's computer systems. Although there are a number of solutions proposed to provide adequate protection against buffer overflow attacks, most of existing solutions terminate the vulnerable program when the buffer overflow occurs, effectively rendering the program unavailable. The impact on availability is a serious problem on service-oriented platforms. This paper presents SafeStack, a system that can automatically diagnose and patch stack-based buffer overflow vulnerabilities. The key technique of our solution is to virtualize memory accesses and move the vulnerable buffer into protected memory regions, which provides a fundamental and effective protection against recurrence of the same attack without stopping normal system execution. We developed a prototype on a Linux system, and conducted extensive experiments to evaluate the effectiveness and performance of the system using a range of applications. Our experimental results showed that SafeStack can quickly generate runtime patches to successfully handle the attack's recurrence. Furthermore, SafeStack only incurs acceptable overhead for the patched applications.
引用
收藏
页码:368 / 379
页数:12
相关论文
共 44 条
[1]   Preventing memory error exploits with WIT [J].
Akritidis, Periklis ;
Cadar, Cristian ;
Raiciu, Costin ;
Costa, Manuel ;
Castro, Miguel .
PROCEEDINGS OF THE 2008 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2008, :263-+
[2]  
[Anonymous], 2013, INTERNET SECURITY TH
[3]  
[Anonymous], 2013, US CERT VULNERABILIT
[4]  
[Anonymous], 2004, P 11 NETW DISTR SYST
[5]  
[Anonymous], 2012, STACK SMASHING TECHN
[6]  
[Anonymous], 2013, LIBDASM DISASSEMBLY
[7]  
Baratloo A, 2000, USENIX ASSOCIATION PROCEEDINGS OF THE 2000 USENIX ANNUAL TECHNICAL CONFERENCE, P251
[8]  
Berger ED, 2006, ACM SIGPLAN NOTICES, V41, P158, DOI 10.1145/1133981.1134000
[9]  
Bhatkar S., 2003, P 12 USENIX SEC S
[10]  
Bhatkar S., 2005, Proceedings of the 14th USENIX Security Symposium, SEC '05, P271