Defeating Memory Corruption Attacks via Pointer Taintedness Detection
- Shuo Chen ,
- Jun Xu ,
- Nithin Nakka ,
- Zbigniew Kalbarczyk ,
- Ravishankar K. Iyer
Proceedings of IEEE International Conference on Dependable Systems and Networks |
Published by IEEE Computer Society
Most malicious attacks compromise system security through memory corruption exploits. Recently proposed techniques attempt to defeat these attacks by protecting program control data. We have constructed a new class of attacks that can compromise network applications without tampering with any control data. These non-control data attacks represent a new challenge to system security. In this paper, we propose an architectural technique to defeat both control data and non-control data attacks based on the notion of pointer taintedness. A pointer is said to be tainted if user input can be used as the pointer value. A security attack is detected whenever a tainted value is dereferenced during program execution. The proposed architecture is implemented on the SimpleScalar processor simulator and is evaluated using synthetic programs as well as real-world network applications. Our technique can effectively detect both control data and noncontrol data attacks, and it offers better security coverage than current methods. The proposed architecture is transparent to existing programs.
Copyright © 2007 IEEE. Reprinted from IEEE Computer Society.This material is posted here with permission of the IEEE. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to [email protected] choosing to view this document, you agree to all provisions of the copyright laws protecting it.