Effective and Efficient Memory Protection Using Dynamic Tainting

@article{Doudalis2012EffectiveAE,
  title={Effective and Efficient Memory Protection Using Dynamic Tainting},
  author={Ioannis Doudalis and James A. Clause and G. Venkataramani and M. Prvulovic and A. Orso},
  journal={IEEE Transactions on Computers},
  year={2012},
  volume={61},
  pages={87-100}
}
  • Ioannis Doudalis, James A. Clause, +2 authors A. Orso
  • Published 2012
  • Computer Science
  • IEEE Transactions on Computers
  • Programs written in languages allowing direct access to memory through pointers often contain memory-related faults, which cause nondeterministic failures and security vulnerabilities. We present a new dynamic tainting technique to detect illegal memory accesses. When memory is allocated, at runtime, we taint both the memory and the corresponding pointer using the same taint mark. Taint marks are then propagated and checked every time a memory address m is accessed through a pointer p; if the… CONTINUE READING
    21 Citations
    Tag-Protector: An Effective and Dynamic Detection of Out-of-bound Memory Accesses
    • 4
    Tag-Protector: An Effective and Dynamic Detection of Illegal Memory Accesses through Compile Time Code Instrumentation
    • 1
    • Highly Influenced
    • PDF
    ARMOR: A Recompilation and Instrumentation-Free Monitoring Architecture for Detecting Memory Exploits
    • 1
    • PDF
    Learning Fine-Grained Structured Input for Memory Corruption Detection
    • PDF
    CHOP: Bypassing Runtime Bounds Checking Through Convex Hull OPtimization
    • PDF
    DTaint: Detecting the Taint-Style Vulnerability in Embedded Device Firmware
    • K. Cheng, Q. Li, +4 authors Zhenkai Liang
    • Computer Science
    • 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
    • 2018
    • 12
    EraseMe: A Defense Mechanism against Information Leakage exploiting GPU Memory
    • PDF
    CustomPro: Network Protocol Customization Through Cross-Host Feature Analysis
    • 1
    • PDF
    StatSym: Vulnerable Path Discovery through Statistics-Guided Symbolic Execution
    • 25
    • PDF

    References

    SHOWING 1-10 OF 40 REFERENCES
    Effective memory protection using dynamic tainting
    • 60
    • PDF
    Efficient detection of all pointer and array access errors
    • 424
    • PDF
    ARCHER: using symbolic, path-sensitive analysis to detect memory access errors
    • 218
    • PDF
    Fast detection of memory leaks and access errors
    • 548
    • PDF
    SafeMem: exploiting ECC-memory for detecting memory leaks and memory corruption during production runs
    • Feng Qin, Shan Lu, Y. Zhou
    • Computer Science
    • 11th International Symposium on High-Performance Computer Architecture
    • 2005
    • 171
    • PDF
    SAFECode: enforcing alias analysis for weakly typed languages
    • 157
    • PDF
    Hardbound: architectural support for spatial safety of the C programming language
    • 174
    • Highly Influential
    • PDF
    MemTracker: Efficient and Programmable Support for Memory Access Monitoring and Debugging
    • 123
    • PDF
    SoftBound: highly compatible and complete spatial memory safety for c
    • 430
    • Highly Influential
    • PDF
    Flexible Hardware Acceleration for Instruction-Grain Program Monitoring
    • 138
    • PDF