Embedded TaintTracker: Lightweight Tracking of Taint Data against Buffer Overflow Attacks

被引:0
|
作者
Lin, Ying-Dar [1 ]
Wu, Fan-Cheng [1 ]
Huang, Tze-Yau [1 ]
Lai, Yuan-Cheng [2 ]
Lin, Frank C. [3 ]
机构
[1] Natl Chiao Tung Univ, Dept Comp Sci & Informat Engn, Hsinchu 30050, Taiwan
[2] Natl Taiwan Univ Sci & Technol, Dept Informat Management, Taipei, Taiwan
[3] San Jose State Univ, Dept Comp Engn, San Jose, CA USA
关键词
Software security; buffer overflow; taint tracking;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Taint tracking is a novel technique to prevent buffer overflow. Previous studies on taint tracking ran a victim's program on an emulator to dynamically instrument the code for tracking the propagation of taint data in memory and checking whether malicious code is executed. However, the critical problem of this approach is its heavy performance overhead. This paper proposes a new taint-style system called Embedded TaintTracker to eliminate the overhead in the emulator and dynamic instrumentation by compressing a checking mechanism into the operating system (OS) kernel and moving the instrumentation from runtime to compilation time. Results show that the proposed system outperforms the previous work, TaintCheck, by at least 8 times on throughput degradation, and is about 17.5 times faster than TaintCheck when browsing 1KB web pages.
引用
收藏
页数:5
相关论文
共 41 条
  • [21] Libsafe: Transparent system-wide protection against buffer overflow attacks
    Tsai, T
    Singh, N
    INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS, 2002, : 541 - 541
  • [22] rDefender: A Lightweight and Robust Defense Against Flow Table Overflow Attacks in SDN
    Kong, Dezhang
    Chen, Xiang
    Wu, Chunming
    Shen, Yi
    Zhou, Zhengyan
    Cheng, Qiumei
    Liu, Xuan
    Yang, Mingliang
    Qiu, Yubing
    Zhang, Dong
    Khan, Muhammad Khurram
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 9436 - 9451
  • [23] Hardware/software optimization for array & pointer boundary checking against buffer overflow attacks
    Shao, Zili
    Cao, Jiannong
    Chan, Keith C. C.
    Xue, Chun
    Sha, Edwin H. -M.
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2006, 66 (09) : 1129 - 1136
  • [24] Return address randomization scheme for annuling data-injection buffer overflow attacks
    Kim, Deok Jin
    Kim, Tae Hyung
    Kim, Jong
    Hong, Sung Je
    INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 2006, 4318 : 238 - +
  • [25] Efficient array & pointer bound checking against buffer overflow attacks via hardware/software
    Shao, ZL
    Xue, C
    Zhuge, QF
    Sha, EHM
    Xiao, B
    ITCC 2005: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, 2005, : 780 - 785
  • [26] Run-time detection of buffer overflow attacks without explicit sensor data objects
    Pyo, C
    Kim, T
    Bae, B
    Lee, G
    ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, PROCEEDINGS, 2004, : 50 - 54
  • [27] Experimental Evaluation of the Defense Capability of ARM-based Systems against Buffer Overflow Attacks in Wireless Networks
    Zhou, Sun
    Chen, Jun
    PROCEEDINGS OF 2020 IEEE 10TH INTERNATIONAL CONFERENCE ON ELECTRONICS INFORMATION AND EMERGENCY COMMUNICATION (ICEIEC 2020), 2020, : 375 - 378
  • [28] Design of Experimental Test Bed to Evaluate Effectiveness of Software Protection Mechanisms Against Buffer Overflow Attacks Through Emulation
    Srikanth, V.
    Kisore, N. Raghu
    2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2015, : 786 - 792
  • [29] HardScope: Hardening Embedded Systems Against Data-Oriented Attacks
    Nyman, Thomas
    Dessouky, Ghada
    Zeitouni, Shaza
    Lehikoinen, Aaro
    Paverd, Andrew
    Asokan, N.
    Sadeghi, Ahmad-Reza
    PROCEEDINGS OF THE 2019 56TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2019,
  • [30] LanCe: A Comprehensive and Lightweight CNN Defense Methodology against Physical Adversarial Attacks on Embedded Multimedia Applications
    Xu, Zirui
    Yu, Fuxun
    Chen, Xiang
    2020 25TH ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE, ASP-DAC 2020, 2020, : 470 - 475