標題: Embedded TaintTracker: Lightweight Run-Time Tracking of Taint Data against Buffer Overflow Attacks
作者: Lai, Yuan-Cheng
Lin, Ying-Dar
Wu, Fan-Cheng
Huang, Tze-Yau
Lin, Frank C.
資訊工程學系
Department of Computer Science
關鍵字: software security;buffer overflow;taint tracking
公開日期: 1-Nov-2011
摘要: A buffer overflow attack occurs when a program writes data outside the allocated memory in an attempt to invade a system. Approximately forty percent of all software vulnerabilities over the past several years are attributed to buffer overflow. Taint tracking is a novel technique to prevent buffer overflow. Previous studies on taint tracking ran a victim's program on an emulator to dynamically instrument the code for tracking the propagation of taint data in memory and checking whether malicious code is executed. However, the critical problem of this approach is its heavy performance overhead. Analysis of this overhead shows that 60% of the overhead is from the emulator, and the remaining 40% is from dynamic instrumentation and taint information maintenance. This article proposes a new taint-style system called Embedded TaintTracker to eliminate the overhead in the emulator and dynamic instrumentation by compressing a checking mechanism into the operating system (OS) kernel and moving the instrumentation from runtime to compilation time. Results show that the proposed system outperforms the previous work. TaintCheck, by at least 8 times on throughput degradation, and is about 17.5 times faster than TaintCheck when browsing 1 KB web pages.
URI: http://dx.doi.org/10.1587/transinf.E94.D.2129
http://hdl.handle.net/11536/14679
ISSN: 0916-8532
DOI: 10.1587/transinf.E94.D.2129
期刊: IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS
Volume: E94D
Issue: 11
起始頁: 2129
結束頁: 2138
Appears in Collections:Articles


Files in This Item:

  1. 000296673400008.pdf

If it is a zip file, please download the file and unzip it, then open index.html in a browser to view the full text content.