Defeating memory corruption attacks via pointer taintedness detection

被引:0
作者
Chen, S [1 ]
Xu, J [1 ]
Nakka, N [1 ]
Kalbarczyk, Z [1 ]
Iyer, RK [1 ]
机构
[1] Univ Illinois, Ctr Reliable & High Performance Comp, Urbana, IL 61801 USA
来源
2005 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS | 2005年
关键词
security; attack; vulnerability; taintedness; hardware design;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Most malicious attacks compromise system security through memory corruption exploits. Recently proposed techniques attempt to defeat these attacks by protecting program control data. We have constructed a new class of attacks that can compromise network applications without tampering with any control data. These non-control data attacks represent a new challenge to system security. In this paper, we propose an architectural technique to defeat both control data and non-control data attacks based on the notion of pointer taintedness. A pointer is said to be tainted if user input can be used as the pointer value. A security attack is detected whenever a tainted value is dereferenced during program execution. The proposed architecture is implemented on the SimpleScalar processor stimulator and is evaluated using synthetic programs as well as real-world network applications. Our technique can effectively detect both control data and non-control data attacks, and it offers better security coverage than current methods. The proposed architecture is transparent to existing programs.
引用
收藏
页码:378 / 387
页数:10
相关论文
共 18 条
[1]  
BHATKAR S, 2003, 12 US SEC S WASH DC
[2]  
Burger D., 1997, SIMPLESCALAR TOOL SE
[3]  
CHEN S, 2004, 19 IFIP INT INF SEC
[4]  
CHESS B, 2002, IEEE S SEC PRIV
[5]  
COWAN C, 2001, 10 USENIX SEC S WASH
[6]  
Cowan C., 1998, 7 USENIX SEC S SAN A
[7]  
CRANDALL JR, 2004, IN PRESS 37 INT S MI
[8]  
EVANS D, 2002, IEEE SOFTWARE JAN
[9]  
*MICR TECHNET, CHANG FUNCT MICR WIN
[10]  
Newsham T., 2000, Format string attacks