UFO: Predictive Concurrency Use-After-Free Detection

被引:26
|
作者
Huang, Jeff [1 ]
机构
[1] Texas A&M Univ, Parasol Lab, College Stn, TX 77843 USA
基金
美国国家科学基金会;
关键词
UAF; Concurrency; Vulnerabilities; UFO;
D O I
10.1145/3180155.3180225
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Use-After-Free (UAF) vulnerabilities are caused by the program operating on a dangling pointer and can be exploited to compromise critical software systems. While there have been many tools to mitigate UAF vulnerabilities, UAF remains one of the most common attack vectors. UAF is particularly difficult to detect in concurrent programs, in which a UAF may only occur with rare thread schedules. In this paper, we present a novel technique, UFO, that can precisely predict UAFs based on a single observed execution trace with a provably higher detection capability than existing techniques with no false positives. The key technical advancement of UFO is an extended maximal thread causality model that captures the largest possible set of feasible traces that can be inferred from a given multithreaded execution trace. By formulating UAF detection as a constraint solving problem atop this model, we can explore a much larger thread scheduling space than classical happens-before based techniques. We have evaluated UFO on several real-world large complex C/C++ programs including Chromium and FireFox. UFO scales to real-world systems with hundreds of millions of events in their execution and has detected a large number of real concurrency UAFs.
引用
收藏
页码:609 / 619
页数:11
相关论文
共 50 条
  • [21] PUMM: Preventing Use-After-Free Using Execution Unit Partitioning
    Yagemann, Carter
    Chung, Simon P.
    Saltaformaggio, Brendan
    Lee, Wenke
    [J]. PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 823 - 840
  • [22] Typestate-Guided Fuzzer for Discovering Use-after-Free Vulnerabilities
    Wang, Haijun
    Xie, Xiaofei
    Li, Yi
    Wen, Cheng
    Li, Yuekang
    Liu, Yang
    Qin, Shengchao
    Chen, Hongxu
    Sui, Yulei
    [J]. 2020 ACM/IEEE 42ND INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2020), 2020, : 999 - 1010
  • [23] HeapExpo: Pinpointing Promoted Pointers to Prevent Use-After-Free Vulnerabilities
    Shen, Zekun
    Dolan-Gavitt, Brendan
    [J]. 36TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2020), 2020, : 454 - 465
  • [24] Identifying Use-After-Free Variables in Fire-and-Forget Tasks
    Krishna, Jyothi V. S.
    Litvinov, Vassily
    [J]. 2017 IEEE INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM WORKSHOPS (IPDPSW), 2017, : 1086 - 1094
  • [25] MineSweeper: A "Clean Sweep" for Drop-In Use-after-Free Prevention
    Erdos, Marton
    Ainsworth, Sam
    Jones, Timothy M.
    [J]. ASPLOS '22: PROCEEDINGS OF THE 27TH ACM INTERNATIONAL CONFERENCE ON ARCHITECTURAL SUPPORT FOR PROGRAMMING LANGUAGES AND OPERATING SYSTEMS, 2022, : 212 - 225
  • [26] Refining Use-after-free Defense: Eliminating Dangling Pointers in Registers and Memory
    An, Xun
    Zhou, Qihang
    Du, HaiChao
    Song, ZhenYu
    Jia, Xiaoqi
    [J]. PROCEEDINGS OF THE 2023 30TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE, APSEC 2023, 2023, : 493 - 502
  • [27] FreeSentry: Protecting Against Use-After-Free Vulnerabilities Due to Dangling Pointers
    Younan, Yves
    [J]. 22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,
  • [28] From Collision To Exploitation: Unleashing Use-After-Free Vulnerabilities in Linux Kernel
    Xu, Wen
    Li, Juanru
    Shu, Junliang
    Yang, Wenbo
    Xie, Tianyi
    Zhang, Yuanyuan
    Gu, Dawu
    [J]. CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 414 - 425
  • [29] Multi-level Directed Fuzzing for Detecting Use-after-Free Vulnerabilities
    Zhang, Yuntao
    Wang, Zhongru
    Yu, Weiqiang
    Fang, Binxing
    [J]. 2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 569 - 576
  • [30] FUZE: Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities
    Wu, Wei
    Chen, Yueqi
    Xu, Jun
    Xing, Xinyu
    Gong, Xiaorui
    Zou, Wei
    [J]. PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, 2018, : 781 - 797