Embedded TaintTracker: Lightweight Tracking of Taint Data against Buffer Overflow Attacks

被引:0
|
作者
Lin, Ying-Dar [1 ]
Wu, Fan-Cheng [1 ]
Huang, Tze-Yau [1 ]
Lai, Yuan-Cheng [2 ]
Lin, Frank C. [3 ]
机构
[1] Natl Chiao Tung Univ, Dept Comp Sci & Informat Engn, Hsinchu 30050, Taiwan
[2] Natl Taiwan Univ Sci & Technol, Dept Informat Management, Taipei, Taiwan
[3] San Jose State Univ, Dept Comp Engn, San Jose, CA USA
关键词
Software security; buffer overflow; taint tracking;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Taint tracking is a novel technique to prevent buffer overflow. Previous studies on taint tracking ran a victim's program on an emulator to dynamically instrument the code for tracking the propagation of taint data in memory and checking whether malicious code is executed. However, the critical problem of this approach is its heavy performance overhead. This paper proposes a new taint-style system called Embedded TaintTracker to eliminate the overhead in the emulator and dynamic instrumentation by compressing a checking mechanism into the operating system (OS) kernel and moving the instrumentation from runtime to compilation time. Results show that the proposed system outperforms the previous work, TaintCheck, by at least 8 times on throughput degradation, and is about 17.5 times faster than TaintCheck when browsing 1KB web pages.
引用
收藏
页数:5
相关论文
共 41 条
  • [41] Adaptive Resilient Tracking Control With Dual-Terminal Dynamic-Triggering for a Linear Multi-Agent System Against False Data Injection Attacks
    Yang, Yang
    Wang, Xue
    Li, Yanfei
    Gorbachev, Sergey
    Yue, Dong
    IEEE TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING OVER NETWORKS, 2023, 9 : 1 - 12