Comprehensive Memory Error Protection via Diversity and Taint-Tracking

نویسنده

  • Lorenzo Cavallaro
چکیده

of the Dissertation Comprehensive Memory Error Protection via Diversity and Taint-Tracking by Lorenzo Cavallaro Doctor of Philosophy in Computer Science Università degli Studi di Milano 2007 Memory errors in C and C++ programs are one of the oldest classes of vulnerabilities. Attackers have been exploiting these errors since late 80’s and these issues are still a real and concrete threat. To date, several countermeasures to combat memory error vulnerabilities have been proposed. They cover a broad range of Computer Science disciplines, going from safe programming language solutions, anomaly detection approaches, and information-flow (also known as taint analysis) based strategies, to techniques that modify the underlying compiler, the operating system and underlying hardware, and system libraries. Among the others, transformation techniques which aim to provide artificial diversity, or are based on taint analysis approaches, seem to be the most promising and effective against a broad class of memory error vulnerabilities. Unfortunately, as protection mechanisms improve, so do the attacks, and existing transformation techniques which aim to provide artificial diversity or to perform taint analysis either cannot deal with all the memory errors, or they provide only probabilistic protection (e.g., artificial diversity) or, again, they have a high rate of false positives when dealing with some memory error vulnerabilities (e.g., pointer and non-pointer data corruption). This dissertation aims to provide comprehensive solutions to memory error vulnerabilities. Recognizing the effectiveness of the aforementioned diversity, taint-tracking, and anomaly-based detection strategies,

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Toward a Better Understanding of the Properties and Impact of Memory Hardware Errors

In modern computers, memory modules are a major and relatively expensive component. While the literature is rich in transient memory errors observed in special controlled equipment, and has moderately developed some understanding in terms of the impact of memory errors to high-level software, it lacks a systematic assessment of computer hardware memory errors from ground up. This thesis is dedi...

متن کامل

LazyTainter : Memory - Efficient Taint Tracking in Managed Runtimes

LazyTainter : Memory-Efficient Taint Tracking in Managed Runtimes Zheng Wei Master of Science Graduate Department of Computer Science University of Toronto 2014 The leakage of private information is of great concern on mobile devices since they contain a great deal of sensitive information. This has spurred interest in the use of taint tracking systems to track and monitor the flow of private i...

متن کامل

GPU Taint Tracking

Dynamic tainting tracks the influence of certain inputs (taint sources) through execution and it is a powerful tool for information flow analysis and security. Taint tracking has primarily targeted CPU program executions. Motivated by recent recognition of information leaking in GPU memory and GPU-resident malware, this paper presents the first design and prototype implementation of a taint tra...

متن کامل

DROIT+: Taint Tracking for Storage Access on Android

The leakage of sensitive data has been a major concern in Android ecosystem. Analysts therefore propose dynamical taint tracking to effectively track the data flow of accessed data. However, the off-the-shelf taint tracking systems lack byte-granularity support for storage tracking. In this paper, we propose DROIT+ which uses the fine-grained storage tracking technique to track data flow among ...

متن کامل

PHP Aspis: Using Partial Taint Tracking to Protect Against Injection Attacks

Web applications are increasingly popular victims of security attacks. Injection attacks, such as Cross Site Scripting or SQL Injection, are a persistent problem. Even though developers are aware of them, the suggested best practices for protection are error prone: unless all user input is consistently filtered, any application may be vulnerable. When hosting web applications, administrators fa...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007