tag protector an effective and dynamic detection of out
play

Tag-Protector: An Effective and Dynamic Detection of Out-of-bound - PowerPoint PPT Presentation

Tag-Protector: An Effective and Dynamic Detection of Out-of-bound Memory Accesses Ahmed Saeed, Ali Ahmadinia Mike Just School of Engineering and Built Environment School of Mathematics and Glasgow Caledonian University, United Kingdom


  1. Tag-Protector: An Effective and Dynamic Detection of Out-of-bound Memory Accesses Ahmed Saeed, Ali Ahmadinia Mike Just School of Engineering and Built Environment School of Mathematics and Glasgow Caledonian University, United Kingdom Computer Sciences, Heriot-watt University, United Kingdom Ahmed Saeed (ahmed.saeed@gcu.ac.uk) 1 School of Engineering and Computing Glasgow Caledonian University

  2. Outline  Introduction  Problem Statement  Proposed solution  Methodology  Implementation  Results and Discussion  Conclusion Ahmed Saeed (ahmed.saeed@gcu.ac.uk) 2 School of Engineering and Computing Glasgow Caledonian University

  3. Introduction  Illegal memory accesses (IMAs) are major concerns in applications written with programming languages like C/C++.  Typical programming errors: out-of-bound array indexing and dangling pointer dereferences  Spatial IMA :more commonly known as buffer overflow  Temporal IMA: also known as use-after-free access Ahmed Saeed (ahmed.saeed@gcu.ac.uk) 3 School of Engineering and Computing Glasgow Caledonian University

  4. Problem Statement  Increase in software content and network connectivity.  Software is not fully trustable.  Software-based attacks: Stack smashing through buffer overflows  Illegal memory reads and writes  Protect System/Data / Programs against  Extraction of secret information: Data confidentiality  Modification in the behavior: Data integrity  Denial of service: Availability Ahmed Saeed (ahmed.saeed@gcu.ac.uk) 4 School of Engineering and Computing Glasgow Caledonian University

  5. Proposed Solution  Detect IMAs dynamically through tag based protection  Based on source code instrumentation through LLVM compiler framework  Targets data confidentiality and integrity attacks.  Effectiveness evaluated through various benchmark suites and testbed codes  Presented lower memory and performance overhead Ahmed Saeed (ahmed.saeed@gcu.ac.uk) 5 School of Engineering and Computing Glasgow Caledonian University

  6. Methodology  Require application source code  Implementation is based on following steps.  Convert code in to Intermediate Representation(IR)  Detect memory allocations instructions  Link each memory objects with a special tag  Detect memory access instructions.  Insert tag address and value check instructions Ahmed Saeed (ahmed.saeed@gcu.ac.uk) 6 School of Engineering and Computing Glasgow Caledonian University

  7. Methodology Ahmed Saeed (ahmed.saeed@gcu.ac.uk) 7 School of Engineering and Computing Glasgow Caledonian University

  8. Implementation Figure 2: Tag-Protection implementation block diagram Ahmed Saeed (ahmed.saeed@gcu.ac.uk) 8 School of Engineering and Computing Glasgow Caledonian University

  9. Implementation Ahmed Saeed (ahmed.saeed@gcu.ac.uk) 9 School of Engineering and Computing Glasgow Caledonian University

  10. Results and Discussion Ahmed Saeed (ahmed.saeed@gcu.ac.uk) 10 School of Engineering and Computing Glasgow Caledonian University

  11. Results and Discussion Ahmed Saeed (ahmed.saeed@gcu.ac.uk) 11 School of Engineering and Computing Glasgow Caledonian University

  12. Results and Discussion Ahmed Saeed (ahmed.saeed@gcu.ac.uk) 12 School of Engineering and Computing Glasgow Caledonian University

  13. Results and Discussion Ahmed Saeed (ahmed.saeed@gcu.ac.uk) 13 School of Engineering and Computing Glasgow Caledonian University

  14. Conclusion  A fast and effective tag-protection solution to detect illegal memory accesses.  Implemented as an instrumentation pass using LLVM and operates at source-code level.  Less performance overhead when compared with the publicly available tools. Ahmed Saeed (ahmed.saeed@gcu.ac.uk) 14 School of Engineering and Computing Glasgow Caledonian University

  15. Any Questions? Ahmed Saeed (ahmed.saeed@gcu.ac.uk) 15 School of Engineering and Computing Glasgow Caledonian University

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend