Embedded TaintTracker: Lightweight Tracking of Taint Data against Buffer Overflow Attacks

被引:0
|
作者
Lin, Ying-Dar [1 ]
Wu, Fan-Cheng [1 ]
Huang, Tze-Yau [1 ]
Lai, Yuan-Cheng [2 ]
Lin, Frank C. [3 ]
机构
[1] Natl Chiao Tung Univ, Dept Comp Sci & Informat Engn, Hsinchu 30050, Taiwan
[2] Natl Taiwan Univ Sci & Technol, Dept Informat Management, Taipei, Taiwan
[3] San Jose State Univ, Dept Comp Engn, San Jose, CA USA
关键词
Software security; buffer overflow; taint tracking;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Taint tracking is a novel technique to prevent buffer overflow. Previous studies on taint tracking ran a victim's program on an emulator to dynamically instrument the code for tracking the propagation of taint data in memory and checking whether malicious code is executed. However, the critical problem of this approach is its heavy performance overhead. This paper proposes a new taint-style system called Embedded TaintTracker to eliminate the overhead in the emulator and dynamic instrumentation by compressing a checking mechanism into the operating system (OS) kernel and moving the instrumentation from runtime to compilation time. Results show that the proposed system outperforms the previous work, TaintCheck, by at least 8 times on throughput degradation, and is about 17.5 times faster than TaintCheck when browsing 1KB web pages.
引用
收藏
页数:5
相关论文
共 41 条
  • [11] A New Data Randomization Method to Defend Buffer Overflow Attacks
    Yan Fen
    Yuan Fuchao
    Shen Xiaobing
    Yin Xinchun
    Mao Bing
    INTERNATIONAL CONFERENCE ON APPLIED PHYSICS AND INDUSTRIAL ENGINEERING 2012, PT C, 2012, 24 : 1757 - 1764
  • [12] A New Data Randomization Method to Defend Buffer Overflow Attacks
    Yan Fen
    Yuan Fuchao
    Shen Xiaobing
    Yin Xinchun
    Bing, Mao
    2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL I, 2010, : 466 - 469
  • [13] FFRR: a software diversity technique for defending against buffer overflow attacks
    Kisore, N. Raghu
    Kumar, K. Shiva
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2022, 18 (1-2) : 40 - 74
  • [14] Protection against Buffer Overflow Attacks via Dynamic Binary Translation
    Chen, Chun-Chung
    Hung, Shih-Hao
    Lee, Chen-Pang
    RELIABLE AND AUTONOMOUS COMPUTATIONAL SCIENCE, 2011, : 305 - +
  • [15] A segment-based approach of defending against buffer overflow attacks
    Tan, YA
    Zheng, JY
    Cao, YD
    PDCAT 2005: SIXTH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2005, : 430 - 432
  • [16] SegmentShield: Exploiting segmentation hardware for protecting against buffer overflow attacks
    Shinagawa, Takahiro
    SRDS 2006: 25TH IEEE SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS, PROCEEDINGS, 2006, : 277 - 286
  • [17] A binary rewriting defense against stack based buffer overflow attacks
    Prasad, M
    Chiueh, TC
    USENIX ASSOCIATION PROCEEDINGS OF THE GENERAL TRACK, 2003, : 211 - 224
  • [18] Microarchitectural protection against stack-based buffer overflow attacks
    Park, Yong-Joon
    Zhang, Zhao
    Lee, Gyungho
    IEEE MICRO, 2006, 26 (04) : 62 - 71
  • [19] Defending embedded systems against buffer overflow via Hardware/Software
    Shao, Z
    Zhuge, QF
    He, Y
    Sha, EHM
    19TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2003, : 352 - 361
  • [20] Protection against buffer overflow attacks through runtime memory layout randomization
    Kumar, K. Shiva
    Kisore, N. Raghu
    2014 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY (ICIT), 2014, : 184 - 189