Mitigating Use-After-Free Attack using Library Considering Size and Number of Freed Memory

被引:0
|
作者
Ban, Yuya [1 ]
Yamauchi, Toshihiro [1 ]
机构
[1] Okayama Univ, Grad Sch Nat Sci & Technol, Okayama, Japan
关键词
Security; Use-After-Free; dangling pointer; memory allocation;
D O I
10.1109/CANDARW.2018.00080
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Use-after-free (UAF) vulnerabilities, are abused by exploiting a dangling pointer that refers to a freed memory, location and then executing arbitrary code. Vulnerabilities are caused by bugs in software programs, particularly large scale programs such as browsers. We had previously proposed HeapRevolver [1] [2], which prohibits freed memory area from being reused for a certain period. HeapRevolver on Windows uses the number of freed memory areas that are prohibited for reuse as a trigger to release the freed memory area. Alternatively, HeapRevolver uses the number of the freed memory areas as a threshold for releasing freed memory. However, when the size of individual freed memory area is large, HeapRevolver on Windows increases the memory overhead. In this paper, we propose an improved HeapRevolver for Windows considering the size and number of the freed memory areas. The improved HeapRevolver prohibits the reuse of a certain number of freed memory areas at a given time by considering the size and number of freed memory areas as thresholds. Evaluation results demonstrate that the improved HeapRevolver can prevent attacks that exploit UAF vulnerabilities. Particularly, when the size of individual freed memory area is small in a program, HeapRevolver is effective in decreasing the attack success rate.
引用
收藏
页码:398 / 404
页数:7
相关论文
共 7 条
  • [1] Mitigating Use-After-Free Attacks Using Memory-Reuse-Prohibited Library
    Yamauchi, Toshihiro
    Ikegami, Yuta
    Ban, Yuya
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2017, E100D (10): : 2295 - 2306
  • [2] Mitigating Use-After-Free Attack with Application Program Loader
    Saito, Takamichi
    Sugawara, Ryota
    Yokoyama, Masateru
    Kondo, Shuta
    Miyazaki, Hiroyuki
    Bing, Wang
    Watanabe, Ryohei
    [J]. 2017 IEEE 31ST INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2017, : 919 - 924
  • [3] HeapRevolver: Delaying and Randomizing Timing of Release of Freed Memory Area to Prevent Use-After-Free Attacks
    Yamauchi, Toshihiro
    Ikegami, Yuta
    [J]. NETWORK AND SYSTEM SECURITY, (NSS 2016), 2016, 9955 : 219 - 234
  • [4] Refining Use-after-free Defense: Eliminating Dangling Pointers in Registers and Memory
    An, Xun
    Zhou, Qihang
    Du, HaiChao
    Song, ZhenYu
    Jia, Xiaoqi
    [J]. PROCEEDINGS OF THE 2023 30TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE, APSEC 2023, 2023, : 493 - 502
  • [5] PUMM: Preventing Use-After-Free Using Execution Unit Partitioning
    Yagemann, Carter
    Chung, Simon P.
    Saltaformaggio, Brendan
    Lee, Wenke
    [J]. PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 823 - 840
  • [6] xTag: Mitigating Use-After-Free Vulnerabilities via Software-Based Pointer Tagging on Intel x86-64
    Bernhard, Lukas
    Rodler, Michael
    Holz, Thorsten
    Davit, Lucas
    [J]. 2022 IEEE 7TH EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2022), 2022, : 502 - 519
  • [7] UAF-GUARD: Defending the use-after-free exploits via fine-grained memory permission management
    Xu, Guangquan
    Lei, Wenqing
    Gong, Lixiao
    Liu, Jian
    Bai, Hongpeng
    Chen, Kai
    Wang, Ran
    Wang, Wei
    Liang, Kaitai
    Wang, Weizhe
    Meng, Weizhi
    Liu, Shaoying
    [J]. COMPUTERS & SECURITY, 2023, 125