ARCHERR: Runtime environment driven program safety

被引:0
|
作者
Chinchani, R [1 ]
Iyer, A [1 ]
Jayaraman, B [1 ]
Upadhyaya, S [1 ]
机构
[1] SUNY Buffalo, Buffalo, NY 14260 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Parameters of a program's runtime environment such as the machine architecture and operating system largely determine whether a vulnerability can be exploited. For example, the machine word size is an important factor in an integer overflow attack and likewise the memory layout of a process in a buffer or heap overflow attack. In this paper, we present an analysis of the effects of a runtime environment on a language's data types. Based on this analysis, we have developed Archerr, an automated one-pass source-to-source transformer that derives appropriate architecture dependent runtime safety error checks and inserts them in C source programs. Our approach achieves comprehensive vulnerability coverage against a wide array of program-level exploits including integer overflows/underflows. We demonstrate the efficacy of our technique on versions of C programs with known vulnerabilities such as Send-mail. We have benchmarked our technique and the results show that it is in general less expensive than other well-known runtime techniques, and at the same time requires no extensions to the C programming language. Additional benefits include the ability to gracefully handle arbitrary pointer usage, aliasing, and typecasting.
引用
收藏
页码:385 / 406
页数:22
相关论文
共 50 条
  • [31] Enforcing Safety at Runtime for Systems with Disturbances
    Abate, Matthew
    Coogan, Samuel
    2020 59TH IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2020, : 2038 - 2043
  • [32] Runtime Safety Analysis for Safe Reconfiguration
    Priesterjahn, Claudia
    Heinzemann, Christian
    Schaefer, Wilhelm
    Tichy, Matthias
    2012 10TH IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN), 2012, : 1092 - 1097
  • [33] The open runtime platform: a flexible high-performance managed runtime environment
    Cierniak, M
    Eng, M
    Glew, N
    Lewis, B
    Stichnoth, J
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2005, 17 (5-6): : 617 - 637
  • [34] Enhancing Java']Java Runtime Environment for Smart Cards Against Runtime Attacks
    Akram, Raja Naeem
    Markantonakis, Konstantinos
    Mayes, Keith
    COMPUTER SECURITY - ESORICS 2015, PT II, 2015, 9327 : 541 - 560
  • [35] Requirements-Driven Runtime Reconfiguration for Security
    Yskout, Koen
    Ben David, Olivier-Nathanael
    Scandariato, Riccardo
    Baudry, Benoit
    ETERNAL SYSTEMS, 2012, 255 : 25 - +
  • [36] Oregon's All Roads Transportation Safety Program Data-Driven Program to Improve Safety on All Public Roads
    Siddique, Zahidul Q.
    Bish, Douglas W.
    Haas, Kevin J.
    TRANSPORTATION RESEARCH RECORD, 2016, (2582) : 18 - 25
  • [37] A system for visualizing and animating program runtime histories
    Liu, ZQ
    IEEE SYMPOSIUM ON VISUAL LANGUAGES, PROCEEDINGS, 1996, : 46 - 53
  • [38] Leveraging Speculative Architectures for Runtime Program Validation
    Martinez Santos, Juan Carlos
    Fei, Yunsi
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2013, 13 (01)
  • [39] Industry driven engineering management program within a distance learning environment
    Ladd, ER
    Rumsey, HA
    INNOVATION IN TECHNOLOGY MANAGEMENT - THE KEY TO GLOBAL LEADERSHIP: THE KEY TO GLOBAL LEADERSHIP, 1997, : 281 - 281
  • [40] A compiler and runtime infrastructure for automatic program distribution
    Diaconescu, Roxana E.
    Wang, Lei
    Mouri, Zachary
    Chu, Matt
    Proc. 19th IEEE Int. Parallel Distr. Proces. Symp.,