BFWindow: Speculatively Checking Data Property Consistency against Buffer Overflow Attacks

被引:2
|
作者
Rao, Jinli [1 ]
He, Zhangqing [1 ]
Xu, Shu [2 ]
Dai, Kui [3 ]
Zou, Xuecheng [1 ]
机构
[1] Huazhong Univ Sci & Technol, Sch Opt & Elect Informat, Wuhan 430074, Peoples R China
[2] Sci & Technol Informat Assurance Lab, Beijing, Peoples R China
[3] Peking Univ, Inst Natl Network Secur & Informat, Beijing, Peoples R China
来源
关键词
embedded system security; buffer overflow; data structure coloring; data property consistency; speculatively checking; INTERNET; THINGS;
D O I
10.1587/transinf.2015INP0003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Buffer overflow is one of the main approaches to get control of vulnerable programs. This paper presents a protection technique called BFWindow for performance and resource sensitive embedded systems. By coloring data structure in memory with single associate property bit to each byte and extending the target memory block to a BFWindow(2), it validates each memory write by speculatively checking consistency of data properties within the extended buffer window. Property bits are generated by compiler statically and checked by hardware at runtime. They are transparent to users. Experimental results show that the proposed mechanism is effective to prevent sequential memory writes from crossing buffer boundaries which is the common scenario of buffer overflow exploitations. The performance overhead for practical protection mode across embedded system benchmarks is under 1%.
引用
收藏
页码:2002 / 2009
页数:8
相关论文
共 29 条
  • [1] Security protection and checking in embedded system integration against buffer overflow attacks
    Shao, ZL
    Xue, C
    Zhuge, QF
    Sha, EHM
    Xiao, B
    ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, PROCEEDINGS, 2004, : 409 - 413
  • [2] Hardware/software optimization for array & pointer boundary checking against buffer overflow attacks
    Shao, Zili
    Cao, Jiannong
    Chan, Keith C. C.
    Xue, Chun
    Sha, Edwin H. -M.
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2006, 66 (09) : 1129 - 1136
  • [3] Efficient array & pointer bound checking against buffer overflow attacks via hardware/software
    Shao, ZL
    Xue, C
    Zhuge, QF
    Sha, EHM
    Xiao, B
    ITCC 2005: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, 2005, : 780 - 785
  • [4] Stack Overflow Fence: A Technique for Defending Against Buffer Overflow Attacks
    Madan, Bharat B.
    Phoha, Shashi
    Trivedi, Kishor S.
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2006, 1 (02): : 129 - 136
  • [5] Embedded TaintTracker: Lightweight Tracking of Taint Data against Buffer Overflow Attacks
    Lin, Ying-Dar
    Wu, Fan-Cheng
    Huang, Tze-Yau
    Lai, Yuan-Cheng
    Lin, Frank C.
    2010 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2010,
  • [6] Security protection and checking for embedded system integration against buffer overflow attacks via hardware/software
    Shao, ZL
    Xue, C
    Zhuge, QF
    Qiu, MK
    Xiao, B
    Sha, EHM
    IEEE TRANSACTIONS ON COMPUTERS, 2006, 55 (04) : 443 - 453
  • [7] StackOFFence: A technique for defending against buffer overflow attacks
    Madan, BB
    Phoha, S
    Trivedi, KS
    ITCC 2005: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, 2005, : 656 - 661
  • [8] A hybrid method of defense against buffer overflow attacks
    Dasari, Annapurna
    Dasgupta, Partha
    PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON COMMUNICATION, NETWORK, AND INFORMATION SECURITY, 2005, : 195 - 200
  • [9] A processor architecture Defense against buffer overflow attacks
    McGregor, JP
    Karig, DK
    Shi, ZJ
    Lee, RB
    ITRE2003: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: RESEARCH AND EDUCATION, 2003, : 243 - 250
  • [10] A New Data Randomization Method to Defend Buffer Overflow Attacks
    Yan Fen
    Yuan Fuchao
    Shen Xiaobing
    Yin Xinchun
    Mao Bing
    INTERNATIONAL CONFERENCE ON APPLIED PHYSICS AND INDUSTRIAL ENGINEERING 2012, PT C, 2012, 24 : 1757 - 1764