Bounds Checking with Taint-Based Analysis

作者: Weihaw Chuang , Satish Narayanasamy , Brad Calder , Ranjit Jhala

DOI: 10.1007/978-3-540-69338-3_6

关键词:

摘要: We analyze the performance of different bounds checking implementations. Specifically, we examine using x86 bound instruction to reduce run-time overhead. also propose a compiler optimization that prunes checks are not necessary guarantee security. The is based on observation buffer overflow attacks launched through external inputs. Therefore, it sufficient check only accesses those data structures can possibly hold Also, memory writes. proposed optimizations number required as well amount meta-data need be maintained perform checks.

参考文章(17)
Paul H. J. Kelly, Richard W. M. Jones, Backwards-Compatible Bounds Checking for Arrays and Pointers in C Programs Proceedings of the 3rd International Workshop on Automatic Debugging; 1997 (AADEBUG-97). pp. 13- 26 ,(1997)
Matthew Harren, George C. Necula, Lightweight Wrappers for Interfacing with Binary Code in CCured Lecture Notes in Computer Science. pp. 209- 225 ,(2003) , 10.1007/978-3-540-37621-7_11
Martin Rinard, Cristian Cadar, William S. Beebee, Daniel M. Roy, Tudor Leu, Daniel Dumitran, Enhancing server availability and security through failure-oblivious computing operating systems design and implementation. pp. 21- 21 ,(2004)
Monica S. Lam, Olatunji Ruwase, A practical dynamic buffer overflow detector network and distributed system security symposium. pp. 159- 169 ,(2004)
Mariam Kamkar, John Wilander, A Comparison of Publicly Available Tools for Dynamic Buffer Overflow Prevention network and distributed system security symposium. pp. 149- ,(2003)
James Cheney, Michael W. Hicks, Yanling Wang, Dan Grossman, J. Greg Morrisett, Trevor Jim, Cyclone: A Safe Dialect of C usenix annual technical conference. pp. 275- 288 ,(2002)
Todd M. Austin, Scott E. Breach, Gurindar S. Sohi, Efficient detection of all pointer and array access errors programming language design and implementation. ,vol. 29, pp. 290- 301 ,(1994) , 10.1145/178243.178446
Marc Shapiro, Susan Horwitz, Fast and accurate flow-insensitive points-to analysis symposium on principles of programming languages. pp. 1- 14 ,(1997) , 10.1145/263699.263703
G. Edward Suh, Jae W. Lee, David Zhang, Srinivas Devadas, Secure program execution via dynamic information flow tracking Proceedings of the 11th international conference on Architectural support for programming languages and operating systems - ASPLOS-XI. ,vol. 39, pp. 85- 96 ,(2004) , 10.1145/1024393.1024404
Dawn Xiaodong Song, James Newsome, Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software network and distributed system security symposium. ,(2005)