作者: Ramkumar Chinchani , Anusha Iyer , Bharat Jayaraman , Shambhu Upadhyaya
DOI: 10.1007/978-3-540-30108-0_24
关键词: Pointer (computer programming) 、 Runtime verification 、 Heap overflow 、 Data type 、 Embedded system 、 Computer science 、 Integer overflow
摘要: Parameters of a program’s runtime environment such as the machine architecture and operating system largely determine whether vulnerability can be exploited. For example, word size is an important factor in integer overflow attack likewise memory layout process buffer or heap attack. In this paper, we present analysis effects on language’s data types. Based analysis, have developed Archerr, automated one-pass source-to-source transformer that derives appropriate dependent safety error checks inserts them C source programs. Our approach achieves comprehensive coverage against wide array program-level exploits including overflows/underflows. We demonstrate efficacy our technique versions programs with known vulnerabilities Sendmail. benchmarked results show it general less expensive than other well-known techniques, at same time requires no extensions to programming language. Additional benefits include ability gracefully handle arbitrary pointer usage, aliasing, typecasting.