BFWindow: Speculatively Checking Data Property Consistency against Buffer Overflow Attacks

被引:2
|
作者
Rao, Jinli [1 ]
He, Zhangqing [1 ]
Xu, Shu [2 ]
Dai, Kui [3 ]
Zou, Xuecheng [1 ]
机构
[1] Huazhong Univ Sci & Technol, Sch Opt & Elect Informat, Wuhan 430074, Peoples R China
[2] Sci & Technol Informat Assurance Lab, Beijing, Peoples R China
[3] Peking Univ, Inst Natl Network Secur & Informat, Beijing, Peoples R China
来源
关键词
embedded system security; buffer overflow; data structure coloring; data property consistency; speculatively checking; INTERNET; THINGS;
D O I
10.1587/transinf.2015INP0003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Buffer overflow is one of the main approaches to get control of vulnerable programs. This paper presents a protection technique called BFWindow for performance and resource sensitive embedded systems. By coloring data structure in memory with single associate property bit to each byte and extending the target memory block to a BFWindow(2), it validates each memory write by speculatively checking consistency of data properties within the extended buffer window. Property bits are generated by compiler statically and checked by hardware at runtime. They are transparent to users. Experimental results show that the proposed mechanism is effective to prevent sequential memory writes from crossing buffer boundaries which is the common scenario of buffer overflow exploitations. The performance overhead for practical protection mode across embedded system benchmarks is under 1%.
引用
收藏
页码:2002 / 2009
页数:8
相关论文
共 29 条
  • [21] Libsafe: Transparent system-wide protection against buffer overflow attacks
    Tsai, T
    Singh, N
    INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2002, : 541 - 541
  • [22] Return address randomization scheme for annuling data-injection buffer overflow attacks
    Kim, Deok Jin
    Kim, Tae Hyung
    Kim, Jong
    Hong, Sung Je
    INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 2006, 4318 : 238 - +
  • [23] Assuring Software Security Against Buffer Overflow Attacks in Embedded Software Development Life Cycle
    Park, Chul Su
    Lee, Jae Hee
    Seo, Seong Chae
    Kim, Byung Ki
    12TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: ICT FOR GREEN GROWTH AND SUSTAINABLE DEVELOPMENT, VOLS 1 AND 2, 2010, : 787 - 790
  • [24] Simulation of a secure CPU with SecureTag technique to defend embedded systems against buffer overflow attacks
    Grasser, Michael Georg
    Priebsch, Johannes
    Hofer, Georg
    Hodanek, Thomas
    2007 IEEE/ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1 AND 2, 2007, : 484 - +
  • [25] Run-time detection of buffer overflow attacks without explicit sensor data objects
    Pyo, C
    Kim, T
    Bae, B
    Lee, G
    ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, PROCEEDINGS, 2004, : 50 - 54
  • [26] Experimental Evaluation of the Defense Capability of ARM-based Systems against Buffer Overflow Attacks in Wireless Networks
    Zhou, Sun
    Chen, Jun
    PROCEEDINGS OF 2020 IEEE 10TH INTERNATIONAL CONFERENCE ON ELECTRONICS INFORMATION AND EMERGENCY COMMUNICATION (ICEIEC 2020), 2020, : 375 - 378
  • [27] Design of Experimental Test Bed to Evaluate Effectiveness of Software Protection Mechanisms Against Buffer Overflow Attacks Through Emulation
    Srikanth, V.
    Kisore, N. Raghu
    2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2015, : 786 - 792
  • [28] Secure Split Learning Against Property Inference, Data Reconstruction, and Feature Space Hijacking Attacks
    Mao, Yunlong
    Xin, Zexi
    Li, Zhenyu
    Hong, Jue
    Yang, Qingyou
    Zhong, Sheng
    COMPUTER SECURITY - ESORICS 2023, PT IV, 2024, 14347 : 23 - 43
  • [29] Secure Split Learning against Property Inference, Data Reconstruction, and Feature Space Hijacking Attacks
    Mao, Yunlong
    Xin, Zexi
    Li, Zhenyu
    Hong, Jue
    Yang, Qingyou
    Zhong, Sheng
    arXiv, 2023,