Embedded TaintTracker: Lightweight Tracking of Taint Data against Buffer Overflow Attacks

被引:0
|
作者
Lin, Ying-Dar [1 ]
Wu, Fan-Cheng [1 ]
Huang, Tze-Yau [1 ]
Lai, Yuan-Cheng [2 ]
Lin, Frank C. [3 ]
机构
[1] Natl Chiao Tung Univ, Dept Comp Sci & Informat Engn, Hsinchu 30050, Taiwan
[2] Natl Taiwan Univ Sci & Technol, Dept Informat Management, Taipei, Taiwan
[3] San Jose State Univ, Dept Comp Engn, San Jose, CA USA
关键词
Software security; buffer overflow; taint tracking;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Taint tracking is a novel technique to prevent buffer overflow. Previous studies on taint tracking ran a victim's program on an emulator to dynamically instrument the code for tracking the propagation of taint data in memory and checking whether malicious code is executed. However, the critical problem of this approach is its heavy performance overhead. This paper proposes a new taint-style system called Embedded TaintTracker to eliminate the overhead in the emulator and dynamic instrumentation by compressing a checking mechanism into the operating system (OS) kernel and moving the instrumentation from runtime to compilation time. Results show that the proposed system outperforms the previous work, TaintCheck, by at least 8 times on throughput degradation, and is about 17.5 times faster than TaintCheck when browsing 1KB web pages.
引用
收藏
页数:5
相关论文
共 41 条
  • [1] Embedded TaintTracker: Lightweight Run-Time Tracking of Taint Data against Buffer Overflow Attacks
    Lai, Yuan-Cheng
    Lin, Ying-Dar
    Wu, Fan-Cheng
    Huang, Tze-Yau
    Lin, Frank C.
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2011, E94D (11): : 2129 - 2138
  • [2] Security protection and checking in embedded system integration against buffer overflow attacks
    Shao, ZL
    Xue, C
    Zhuge, QF
    Sha, EHM
    Xiao, B
    ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, PROCEEDINGS, 2004, : 409 - 413
  • [3] Stack Overflow Fence: A Technique for Defending Against Buffer Overflow Attacks
    Madan, Bharat B.
    Phoha, Shashi
    Trivedi, Kishor S.
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2006, 1 (02): : 129 - 136
  • [4] BFWindow: Speculatively Checking Data Property Consistency against Buffer Overflow Attacks
    Rao, Jinli
    He, Zhangqing
    Xu, Shu
    Dai, Kui
    Zou, Xuecheng
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2016, E99D (08): : 2002 - 2009
  • [5] Assuring Software Security Against Buffer Overflow Attacks in Embedded Software Development Life Cycle
    Park, Chul Su
    Lee, Jae Hee
    Seo, Seong Chae
    Kim, Byung Ki
    12TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: ICT FOR GREEN GROWTH AND SUSTAINABLE DEVELOPMENT, VOLS 1 AND 2, 2010, : 787 - 790
  • [6] Simulation of a secure CPU with SecureTag technique to defend embedded systems against buffer overflow attacks
    Grasser, Michael Georg
    Priebsch, Johannes
    Hofer, Georg
    Hodanek, Thomas
    2007 IEEE/ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1 AND 2, 2007, : 484 - +
  • [7] StackOFFence: A technique for defending against buffer overflow attacks
    Madan, BB
    Phoha, S
    Trivedi, KS
    ITCC 2005: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, 2005, : 656 - 661
  • [8] A hybrid method of defense against buffer overflow attacks
    Dasari, Annapurna
    Dasgupta, Partha
    PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON COMMUNICATION, NETWORK, AND INFORMATION SECURITY, 2005, : 195 - 200
  • [9] A processor architecture Defense against buffer overflow attacks
    McGregor, JP
    Karig, DK
    Shi, ZJ
    Lee, RB
    ITRE2003: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: RESEARCH AND EDUCATION, 2003, : 243 - 250
  • [10] Security protection and checking for embedded system integration against buffer overflow attacks via hardware/software
    Shao, ZL
    Xue, C
    Zhuge, QF
    Qiu, MK
    Xiao, B
    Sha, EHM
    IEEE TRANSACTIONS ON COMPUTERS, 2006, 55 (04) : 443 - 453