BFWindow: Speculatively Checking Data Property Consistency against Buffer Overflow Attacks

Buffer overflow is one of the main approaches to get control of vulnerable programs. This paper presents a protection technique called BFWindow for performance and resource sensitive embedded systems. By coloring data structure in memory with single associate property bit to each byte and extending...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEICE Transactions on Information and Systems 2016/08/01, Vol.E99.D(8), pp.2002-2009
Hauptverfasser: RAO, Jinli, HE, Zhangqing, XU, Shu, DAI, Kui, ZOU, Xuecheng
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 2009
container_issue 8
container_start_page 2002
container_title IEICE Transactions on Information and Systems
container_volume E99.D
creator RAO, Jinli
HE, Zhangqing
XU, Shu
DAI, Kui
ZOU, Xuecheng
description Buffer overflow is one of the main approaches to get control of vulnerable programs. This paper presents a protection technique called BFWindow for performance and resource sensitive embedded systems. By coloring data structure in memory with single associate property bit to each byte and extending the target memory block to a BFWindow(2), it validates each memory write by speculatively checking consistency of data properties within the extended buffer window. Property bits are generated by compiler statically and checked by hardware at runtime. They are transparent to users. Experimental results show that the proposed mechanism is effective to prevent sequential memory writes from crossing buffer boundaries which is the common scenario of buffer overflow exploitations. The performance overhead for practical protection mode across embedded system benchmarks is under 1%.
doi_str_mv 10.1587/transinf.2015INP0003
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1855386733</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1855386733</sourcerecordid><originalsourceid>FETCH-LOGICAL-c519t-31ba9b2437c06f17d180f1f903d933fdede4f11d64fcf440a6590715b4cc1ec53</originalsourceid><addsrcrecordid>eNpNkEtPAjEUhRujiYj-AxezdDPYO53Owx1PJSFCosbETVM6tzAwzGDbgfDvxYDI6iQ333ducgi5B9oCnsSPzsjS5qVuBRT48HVCKWUXpAFxyH1gEVySBk0h8hPOgmtyY-2CUkgC4A3y1Rl85mVWbZ-8tzWqupAu32Cx87pzVMu8nHk96aQ3MdUajdufq_0n67BUO0_OZF5a53VqrdF44w0aXVRbr-2cVEt7S660LCzeHbNJPgb99-6LPxo_D7vtka84pM5nMJXpNAhZrGikIc4goRp0SlmWMqYzzDDUAFkUaqXDkMqIpzQGPg2VAlScNcnDoXdtqu8arROr3CosClliVVsBCecsiWLG9mh4QJWprDWoxdrkK2l2Aqj4nVL8TSnOptxrk4O2sE7O8CRJ43JV4L_UT1PRE8kxzypOqJpLI7BkP_vTh4k</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1855386733</pqid></control><display><type>article</type><title>BFWindow: Speculatively Checking Data Property Consistency against Buffer Overflow Attacks</title><source>J-STAGE Free</source><source>EZB Electronic Journals Library</source><creator>RAO, Jinli ; HE, Zhangqing ; XU, Shu ; DAI, Kui ; ZOU, Xuecheng</creator><creatorcontrib>RAO, Jinli ; HE, Zhangqing ; XU, Shu ; DAI, Kui ; ZOU, Xuecheng</creatorcontrib><description>Buffer overflow is one of the main approaches to get control of vulnerable programs. This paper presents a protection technique called BFWindow for performance and resource sensitive embedded systems. By coloring data structure in memory with single associate property bit to each byte and extending the target memory block to a BFWindow(2), it validates each memory write by speculatively checking consistency of data properties within the extended buffer window. Property bits are generated by compiler statically and checked by hardware at runtime. They are transparent to users. Experimental results show that the proposed mechanism is effective to prevent sequential memory writes from crossing buffer boundaries which is the common scenario of buffer overflow exploitations. The performance overhead for practical protection mode across embedded system benchmarks is under 1%.</description><identifier>ISSN: 0916-8532</identifier><identifier>EISSN: 1745-1361</identifier><identifier>DOI: 10.1587/transinf.2015INP0003</identifier><language>eng</language><publisher>The Institute of Electronics, Information and Communication Engineers</publisher><subject>Benchmarks ; Boundaries ; buffer overflow ; Buffers ; Compilers ; Computer information security ; Consistency ; data property consistency ; data structure coloring ; embedded system security ; Hardware ; Run time (computers) ; speculatively checking</subject><ispartof>IEICE Transactions on Information and Systems, 2016/08/01, Vol.E99.D(8), pp.2002-2009</ispartof><rights>2016 The Institute of Electronics, Information and Communication Engineers</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c519t-31ba9b2437c06f17d180f1f903d933fdede4f11d64fcf440a6590715b4cc1ec53</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,1877,4010,27900,27901,27902</link.rule.ids></links><search><creatorcontrib>RAO, Jinli</creatorcontrib><creatorcontrib>HE, Zhangqing</creatorcontrib><creatorcontrib>XU, Shu</creatorcontrib><creatorcontrib>DAI, Kui</creatorcontrib><creatorcontrib>ZOU, Xuecheng</creatorcontrib><title>BFWindow: Speculatively Checking Data Property Consistency against Buffer Overflow Attacks</title><title>IEICE Transactions on Information and Systems</title><addtitle>IEICE Trans. Inf. &amp; Syst.</addtitle><description>Buffer overflow is one of the main approaches to get control of vulnerable programs. This paper presents a protection technique called BFWindow for performance and resource sensitive embedded systems. By coloring data structure in memory with single associate property bit to each byte and extending the target memory block to a BFWindow(2), it validates each memory write by speculatively checking consistency of data properties within the extended buffer window. Property bits are generated by compiler statically and checked by hardware at runtime. They are transparent to users. Experimental results show that the proposed mechanism is effective to prevent sequential memory writes from crossing buffer boundaries which is the common scenario of buffer overflow exploitations. The performance overhead for practical protection mode across embedded system benchmarks is under 1%.</description><subject>Benchmarks</subject><subject>Boundaries</subject><subject>buffer overflow</subject><subject>Buffers</subject><subject>Compilers</subject><subject>Computer information security</subject><subject>Consistency</subject><subject>data property consistency</subject><subject>data structure coloring</subject><subject>embedded system security</subject><subject>Hardware</subject><subject>Run time (computers)</subject><subject>speculatively checking</subject><issn>0916-8532</issn><issn>1745-1361</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2016</creationdate><recordtype>article</recordtype><recordid>eNpNkEtPAjEUhRujiYj-AxezdDPYO53Owx1PJSFCosbETVM6tzAwzGDbgfDvxYDI6iQ333ducgi5B9oCnsSPzsjS5qVuBRT48HVCKWUXpAFxyH1gEVySBk0h8hPOgmtyY-2CUkgC4A3y1Rl85mVWbZ-8tzWqupAu32Cx87pzVMu8nHk96aQ3MdUajdufq_0n67BUO0_OZF5a53VqrdF44w0aXVRbr-2cVEt7S660LCzeHbNJPgb99-6LPxo_D7vtka84pM5nMJXpNAhZrGikIc4goRp0SlmWMqYzzDDUAFkUaqXDkMqIpzQGPg2VAlScNcnDoXdtqu8arROr3CosClliVVsBCecsiWLG9mh4QJWprDWoxdrkK2l2Aqj4nVL8TSnOptxrk4O2sE7O8CRJ43JV4L_UT1PRE8kxzypOqJpLI7BkP_vTh4k</recordid><startdate>2016</startdate><enddate>2016</enddate><creator>RAO, Jinli</creator><creator>HE, Zhangqing</creator><creator>XU, Shu</creator><creator>DAI, Kui</creator><creator>ZOU, Xuecheng</creator><general>The Institute of Electronics, Information and Communication Engineers</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>2016</creationdate><title>BFWindow: Speculatively Checking Data Property Consistency against Buffer Overflow Attacks</title><author>RAO, Jinli ; HE, Zhangqing ; XU, Shu ; DAI, Kui ; ZOU, Xuecheng</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c519t-31ba9b2437c06f17d180f1f903d933fdede4f11d64fcf440a6590715b4cc1ec53</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2016</creationdate><topic>Benchmarks</topic><topic>Boundaries</topic><topic>buffer overflow</topic><topic>Buffers</topic><topic>Compilers</topic><topic>Computer information security</topic><topic>Consistency</topic><topic>data property consistency</topic><topic>data structure coloring</topic><topic>embedded system security</topic><topic>Hardware</topic><topic>Run time (computers)</topic><topic>speculatively checking</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>RAO, Jinli</creatorcontrib><creatorcontrib>HE, Zhangqing</creatorcontrib><creatorcontrib>XU, Shu</creatorcontrib><creatorcontrib>DAI, Kui</creatorcontrib><creatorcontrib>ZOU, Xuecheng</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEICE Transactions on Information and Systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>RAO, Jinli</au><au>HE, Zhangqing</au><au>XU, Shu</au><au>DAI, Kui</au><au>ZOU, Xuecheng</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>BFWindow: Speculatively Checking Data Property Consistency against Buffer Overflow Attacks</atitle><jtitle>IEICE Transactions on Information and Systems</jtitle><addtitle>IEICE Trans. Inf. &amp; Syst.</addtitle><date>2016</date><risdate>2016</risdate><volume>E99.D</volume><issue>8</issue><spage>2002</spage><epage>2009</epage><pages>2002-2009</pages><issn>0916-8532</issn><eissn>1745-1361</eissn><abstract>Buffer overflow is one of the main approaches to get control of vulnerable programs. This paper presents a protection technique called BFWindow for performance and resource sensitive embedded systems. By coloring data structure in memory with single associate property bit to each byte and extending the target memory block to a BFWindow(2), it validates each memory write by speculatively checking consistency of data properties within the extended buffer window. Property bits are generated by compiler statically and checked by hardware at runtime. They are transparent to users. Experimental results show that the proposed mechanism is effective to prevent sequential memory writes from crossing buffer boundaries which is the common scenario of buffer overflow exploitations. The performance overhead for practical protection mode across embedded system benchmarks is under 1%.</abstract><pub>The Institute of Electronics, Information and Communication Engineers</pub><doi>10.1587/transinf.2015INP0003</doi><tpages>8</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 0916-8532
ispartof IEICE Transactions on Information and Systems, 2016/08/01, Vol.E99.D(8), pp.2002-2009
issn 0916-8532
1745-1361
language eng
recordid cdi_proquest_miscellaneous_1855386733
source J-STAGE Free; EZB Electronic Journals Library
subjects Benchmarks
Boundaries
buffer overflow
Buffers
Compilers
Computer information security
Consistency
data property consistency
data structure coloring
embedded system security
Hardware
Run time (computers)
speculatively checking
title BFWindow: Speculatively Checking Data Property Consistency against Buffer Overflow Attacks
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-04T14%3A10%3A17IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=BFWindow:%20Speculatively%20Checking%20Data%20Property%20Consistency%20against%20Buffer%20Overflow%20Attacks&rft.jtitle=IEICE%20Transactions%20on%20Information%20and%20Systems&rft.au=RAO,%20Jinli&rft.date=2016&rft.volume=E99.D&rft.issue=8&rft.spage=2002&rft.epage=2009&rft.pages=2002-2009&rft.issn=0916-8532&rft.eissn=1745-1361&rft_id=info:doi/10.1587/transinf.2015INP0003&rft_dat=%3Cproquest_cross%3E1855386733%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1855386733&rft_id=info:pmid/&rfr_iscdi=true