Enhancing security using legality assertions

被引:0
|
作者
Wang, L [1 ]
Cordy, JR [1 ]
Dean, TR [1 ]
机构
[1] Queens Univ, Sch Comp, Kingston, ON, Canada
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Buffer overflows have been the most common form of security vulnerability in the past decade. A number of techniques have been proposed to address such attacks. Some are limited to protecting the return address on the stack, others are more general, but have undesirable properties such as large overhead and false warnings. The approach described in this paper uses legality assertions, source code assertions inserted before each subscript and pointer dereference that explicitly check that the referencing expression actually specifies a location within the array or object pointed at run time. A transformation system is developed to analyze a program and annotate it with appropriate assertions automatically. This approach detects buffer vulnerabilities in both stack and heap memory as well as potential buffer overflows in library functions. Runtime checking through using automatically inferred assertions considerably enhances the accuracy and efficiency of buffer overflow detection. A number of example buffer overflow-exploiting C programs are used to demonstrate the effectiveness of this approach.
引用
收藏
页码:35 / 44
页数:10
相关论文
共 50 条
  • [1] LEGALITY ASSERTIONS IN EUCLID
    WORTMAN, DB
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1979, 5 (04) : 359 - 367
  • [2] Enhancing the testability of RTL designs using efficiently synthesized assertions
    Kakoee, Mohammad Reza
    Riazati, Mohammad
    Mohammadi, Siamak
    [J]. ISQED 2008: PROCEEDINGS OF THE NINTH INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN, 2008, : 230 - 235
  • [3] Network-on-Chip Trust Validation Using Security Assertions
    Aruna Jayasena
    Binod Kumar
    Subodha Charles
    Hasini Witharana
    Prabhat Mishra
    [J]. Journal of Hardware and Systems Security, 2022, 6 (3-4) : 79 - 94
  • [4] SQL EXTENSIONS FOR SECURITY ASSERTIONS
    STACHOUR, P
    THURAISINGHAM, B
    [J]. COMPUTER STANDARDS & INTERFACES, 1990, 11 (01) : 5 - 14
  • [5] Security through legality
    Bono, Stephen
    Rubin, Aviel
    Stubblefield, Adam
    Green, Matthew
    [J]. COMMUNICATIONS OF THE ACM, 2006, 49 (06) : 41 - 43
  • [6] (Security) Assertions by Large Language Models
    Kande, Rahul
    Pearce, Hammond
    Tan, Benjamin
    Dolan-Gavitt, Brendan
    Thakur, Shailja
    Karri, Ramesh
    Rajendran, Jeyavijayan
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 4374 - 4389
  • [7] Automated Generation of Security Assertions for RTL Models
    Witharana, Hasini
    Jayasena, Aruna
    Whigham, Andrew
    Mishra, Prabhat
    [J]. ACM JOURNAL ON EMERGING TECHNOLOGIES IN COMPUTING SYSTEMS, 2023, 19 (01)
  • [8] Environment-Bound SAML Assertions: A Fresh Approach to Enhance the Security of SAML Assertions
    Chen, Kai
    Lin, Dongdai
    Yan, Li
    Sun, Xin
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2013, 2014, 8567 : 361 - 376
  • [9] Improving Application Security with Data Flow Assertions
    Yip, Alexander
    Wang, Xi
    Zeldovich, Nickolai
    Kaashoek, M. Frans
    [J]. SOSP'09: PROCEEDINGS OF THE TWENTY-SECOND ACM SIGOPS SYMPOSIUM ON OPERATING SYSTEMS PRINCIPLES, 2009, : 291 - 304
  • [10] Using assertions with trace
    Nazimek, Piotr
    [J]. PHOTONICS APPLICATIONS IN ASTRONOMY, COMMUNICATIONS, INDUSTRY, AND HIGH-ENERGY PHYSICS EXPERIMENTS 2015, 2015, 9662