DangSan: Scalable Use-after-free Detection

被引:50
|
作者
van der Kouwe, Erik [1 ]
Nigade, Vinod [1 ]
Giuffrida, Cristiano [1 ]
机构
[1] Vrije Univ Amsterdam, Amsterdam, Netherlands
基金
欧盟地平线“2020”;
关键词
Dangling pointers; use-after-free; LLVM;
D O I
10.1145/3064176.3064211
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Use-after-free vulnerabilities due to dangling pointers are an important and growing threat to systems security. While various solutions exist to address this problem, none of them is sufficiently practical for real-world adoption. Some can be bypassed by attackers, others cannot support complex multithreaded applications prone to dangling pointers, and the remainder have prohibitively high overhead. One major source of overhead is the need to synchronize threads on every pointer write due to pointer tracking. In this paper, we present DangSan, a use-after-free detection system that scales efficiently to large numbers of pointer writes as well as to many concurrent threads. To significantly reduce the overhead of existing solutions, we observe that pointer tracking is write-intensive but requires very few reads. Moreover, there is no need for strong consistency guarantees as inconsistencies can be reconciled at read (i.e., object deallocation) time. Building on these intuitions, DangSan's design mimics that of log-structured file systems, which are ideally suited for similar workloads. Our results show that DangSan can run heavily multithreaded applications, while introducing only half the overhead of previous multithreaded use-after-free detectors.
引用
收藏
页码:405 / 419
页数:15
相关论文
共 50 条
  • [41] Mitigating Use-After-Free Attack using Library Considering Size and Number of Freed Memory
    Ban, Yuya
    Yamauchi, Toshihiro
    [J]. 2018 SIXTH INTERNATIONAL SYMPOSIUM ON COMPUTING AND NETWORKING WORKSHOPS (CANDARW 2018), 2018, : 398 - 404
  • [42] CRCount: Pointer Invalidation with Reference Counting to Mitigate Use-after-free in Legacy C/C plus
    Shin, Jangseop
    Kwon, Donghyun
    Seo, Jiwon
    Cho, Yeongpil
    Paek, Yunheung
    [J]. 26TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2019), 2019,
  • [43] 二进制程序中的use-after-free漏洞检测技术
    韩心慧
    魏爽
    叶佳奕
    张超
    叶志远
    [J]. 清华大学学报(自然科学版), 2017, 57 (10) : 1022 - 1029
  • [44] UAF-GUARD: Defending the use-after-free exploits via fine-grained memory permission management
    Xu, Guangquan
    Lei, Wenqing
    Gong, Lixiao
    Liu, Jian
    Bai, Hongpeng
    Chen, Kai
    Wang, Ran
    Wang, Wei
    Liang, Kaitai
    Wang, Weizhe
    Meng, Weizhi
    Liu, Shaoying
    [J]. COMPUTERS & SECURITY, 2023, 125
  • [45] Spatio-Temporal Context Reduction: A Pointer-Analysis-Based Static Approach for Detecting Use-After-Free Vulnerabilities
    Yan, Hua
    Sui, Yulei
    Chen, Shiping
    Xue, Jingling
    [J]. PROCEEDINGS 2018 IEEE/ACM 40TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), 2018, : 327 - 337
  • [46] Precise and Scalable Detection of Use-after-Compacting-Garbage-Collection Bugs
    Han, HyungSeok
    Wesie, Andrew
    Pak, Brian
    [J]. PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, 2021, : 2059 - 2074
  • [47] xTag: Mitigating Use-After-Free Vulnerabilities via Software-Based Pointer Tagging on Intel x86-64
    Bernhard, Lukas
    Rodler, Michael
    Holz, Thorsten
    Davit, Lucas
    [J]. 2022 IEEE 7TH EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2022), 2022, : 502 - 519
  • [48] Scalable and model-free detection of spatial patterns and colocalization
    Liu, Qi
    Hsu, Chih-Yuan
    Shyr, Yu
    [J]. GENOME RESEARCH, 2022, 32 (09) : 1736 - 1745
  • [49] Easy-to-use scalable antennas for coherent detection of THz radiation
    Winnerl, S.
    Peter, F.
    Nitsche, S.
    Dreyhaupt, A.
    Drachenko, O.
    Schneider, H.
    Helm, M.
    [J]. NARROW GAP SEMICONDUCTORS 2007, 2008, 119 : 167 - 169
  • [50] Automatic Detection of Multilevel Communities: Scalable, Selective and Resolution-Limit-Free
    Gao, Kun
    Ren, Xuezao
    Zhou, Lei
    Zhu, Junfang
    [J]. APPLIED SCIENCES-BASEL, 2023, 13 (03):