BFWindow: Speculatively Checking Data Property Consistency against Buffer Overflow Attacks
Buffer overflow is one of the main approaches to get control of vulnerable programs. This paper presents a protection technique called BFWindow for performance and resource sensitive embedded systems. By coloring data structure in memory with single associate property bit to each byte and extending...
Gespeichert in:
Veröffentlicht in: | IEICE Transactions on Information and Systems 2016/08/01, Vol.E99.D(8), pp.2002-2009 |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 2009 |
---|---|
container_issue | 8 |
container_start_page | 2002 |
container_title | IEICE Transactions on Information and Systems |
container_volume | E99.D |
creator | RAO, Jinli HE, Zhangqing XU, Shu DAI, Kui ZOU, Xuecheng |
description | Buffer overflow is one of the main approaches to get control of vulnerable programs. This paper presents a protection technique called BFWindow for performance and resource sensitive embedded systems. By coloring data structure in memory with single associate property bit to each byte and extending the target memory block to a BFWindow(2), it validates each memory write by speculatively checking consistency of data properties within the extended buffer window. Property bits are generated by compiler statically and checked by hardware at runtime. They are transparent to users. Experimental results show that the proposed mechanism is effective to prevent sequential memory writes from crossing buffer boundaries which is the common scenario of buffer overflow exploitations. The performance overhead for practical protection mode across embedded system benchmarks is under 1%. |
doi_str_mv | 10.1587/transinf.2015INP0003 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1855386733</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1855386733</sourcerecordid><originalsourceid>FETCH-LOGICAL-c519t-31ba9b2437c06f17d180f1f903d933fdede4f11d64fcf440a6590715b4cc1ec53</originalsourceid><addsrcrecordid>eNpNkEtPAjEUhRujiYj-AxezdDPYO53Owx1PJSFCosbETVM6tzAwzGDbgfDvxYDI6iQ333ducgi5B9oCnsSPzsjS5qVuBRT48HVCKWUXpAFxyH1gEVySBk0h8hPOgmtyY-2CUkgC4A3y1Rl85mVWbZ-8tzWqupAu32Cx87pzVMu8nHk96aQ3MdUajdufq_0n67BUO0_OZF5a53VqrdF44w0aXVRbr-2cVEt7S660LCzeHbNJPgb99-6LPxo_D7vtka84pM5nMJXpNAhZrGikIc4goRp0SlmWMqYzzDDUAFkUaqXDkMqIpzQGPg2VAlScNcnDoXdtqu8arROr3CosClliVVsBCecsiWLG9mh4QJWprDWoxdrkK2l2Aqj4nVL8TSnOptxrk4O2sE7O8CRJ43JV4L_UT1PRE8kxzypOqJpLI7BkP_vTh4k</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1855386733</pqid></control><display><type>article</type><title>BFWindow: Speculatively Checking Data Property Consistency against Buffer Overflow Attacks</title><source>J-STAGE Free</source><source>EZB Electronic Journals Library</source><creator>RAO, Jinli ; HE, Zhangqing ; XU, Shu ; DAI, Kui ; ZOU, Xuecheng</creator><creatorcontrib>RAO, Jinli ; HE, Zhangqing ; XU, Shu ; DAI, Kui ; ZOU, Xuecheng</creatorcontrib><description>Buffer overflow is one of the main approaches to get control of vulnerable programs. This paper presents a protection technique called BFWindow for performance and resource sensitive embedded systems. By coloring data structure in memory with single associate property bit to each byte and extending the target memory block to a BFWindow(2), it validates each memory write by speculatively checking consistency of data properties within the extended buffer window. Property bits are generated by compiler statically and checked by hardware at runtime. They are transparent to users. Experimental results show that the proposed mechanism is effective to prevent sequential memory writes from crossing buffer boundaries which is the common scenario of buffer overflow exploitations. The performance overhead for practical protection mode across embedded system benchmarks is under 1%.</description><identifier>ISSN: 0916-8532</identifier><identifier>EISSN: 1745-1361</identifier><identifier>DOI: 10.1587/transinf.2015INP0003</identifier><language>eng</language><publisher>The Institute of Electronics, Information and Communication Engineers</publisher><subject>Benchmarks ; Boundaries ; buffer overflow ; Buffers ; Compilers ; Computer information security ; Consistency ; data property consistency ; data structure coloring ; embedded system security ; Hardware ; Run time (computers) ; speculatively checking</subject><ispartof>IEICE Transactions on Information and Systems, 2016/08/01, Vol.E99.D(8), pp.2002-2009</ispartof><rights>2016 The Institute of Electronics, Information and Communication Engineers</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c519t-31ba9b2437c06f17d180f1f903d933fdede4f11d64fcf440a6590715b4cc1ec53</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,1877,4010,27900,27901,27902</link.rule.ids></links><search><creatorcontrib>RAO, Jinli</creatorcontrib><creatorcontrib>HE, Zhangqing</creatorcontrib><creatorcontrib>XU, Shu</creatorcontrib><creatorcontrib>DAI, Kui</creatorcontrib><creatorcontrib>ZOU, Xuecheng</creatorcontrib><title>BFWindow: Speculatively Checking Data Property Consistency against Buffer Overflow Attacks</title><title>IEICE Transactions on Information and Systems</title><addtitle>IEICE Trans. Inf. & Syst.</addtitle><description>Buffer overflow is one of the main approaches to get control of vulnerable programs. This paper presents a protection technique called BFWindow for performance and resource sensitive embedded systems. By coloring data structure in memory with single associate property bit to each byte and extending the target memory block to a BFWindow(2), it validates each memory write by speculatively checking consistency of data properties within the extended buffer window. Property bits are generated by compiler statically and checked by hardware at runtime. They are transparent to users. Experimental results show that the proposed mechanism is effective to prevent sequential memory writes from crossing buffer boundaries which is the common scenario of buffer overflow exploitations. The performance overhead for practical protection mode across embedded system benchmarks is under 1%.</description><subject>Benchmarks</subject><subject>Boundaries</subject><subject>buffer overflow</subject><subject>Buffers</subject><subject>Compilers</subject><subject>Computer information security</subject><subject>Consistency</subject><subject>data property consistency</subject><subject>data structure coloring</subject><subject>embedded system security</subject><subject>Hardware</subject><subject>Run time (computers)</subject><subject>speculatively checking</subject><issn>0916-8532</issn><issn>1745-1361</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2016</creationdate><recordtype>article</recordtype><recordid>eNpNkEtPAjEUhRujiYj-AxezdDPYO53Owx1PJSFCosbETVM6tzAwzGDbgfDvxYDI6iQ333ducgi5B9oCnsSPzsjS5qVuBRT48HVCKWUXpAFxyH1gEVySBk0h8hPOgmtyY-2CUkgC4A3y1Rl85mVWbZ-8tzWqupAu32Cx87pzVMu8nHk96aQ3MdUajdufq_0n67BUO0_OZF5a53VqrdF44w0aXVRbr-2cVEt7S660LCzeHbNJPgb99-6LPxo_D7vtka84pM5nMJXpNAhZrGikIc4goRp0SlmWMqYzzDDUAFkUaqXDkMqIpzQGPg2VAlScNcnDoXdtqu8arROr3CosClliVVsBCecsiWLG9mh4QJWprDWoxdrkK2l2Aqj4nVL8TSnOptxrk4O2sE7O8CRJ43JV4L_UT1PRE8kxzypOqJpLI7BkP_vTh4k</recordid><startdate>2016</startdate><enddate>2016</enddate><creator>RAO, Jinli</creator><creator>HE, Zhangqing</creator><creator>XU, Shu</creator><creator>DAI, Kui</creator><creator>ZOU, Xuecheng</creator><general>The Institute of Electronics, Information and Communication Engineers</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>2016</creationdate><title>BFWindow: Speculatively Checking Data Property Consistency against Buffer Overflow Attacks</title><author>RAO, Jinli ; HE, Zhangqing ; XU, Shu ; DAI, Kui ; ZOU, Xuecheng</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c519t-31ba9b2437c06f17d180f1f903d933fdede4f11d64fcf440a6590715b4cc1ec53</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2016</creationdate><topic>Benchmarks</topic><topic>Boundaries</topic><topic>buffer overflow</topic><topic>Buffers</topic><topic>Compilers</topic><topic>Computer information security</topic><topic>Consistency</topic><topic>data property consistency</topic><topic>data structure coloring</topic><topic>embedded system security</topic><topic>Hardware</topic><topic>Run time (computers)</topic><topic>speculatively checking</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>RAO, Jinli</creatorcontrib><creatorcontrib>HE, Zhangqing</creatorcontrib><creatorcontrib>XU, Shu</creatorcontrib><creatorcontrib>DAI, Kui</creatorcontrib><creatorcontrib>ZOU, Xuecheng</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEICE Transactions on Information and Systems</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>RAO, Jinli</au><au>HE, Zhangqing</au><au>XU, Shu</au><au>DAI, Kui</au><au>ZOU, Xuecheng</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>BFWindow: Speculatively Checking Data Property Consistency against Buffer Overflow Attacks</atitle><jtitle>IEICE Transactions on Information and Systems</jtitle><addtitle>IEICE Trans. Inf. & Syst.</addtitle><date>2016</date><risdate>2016</risdate><volume>E99.D</volume><issue>8</issue><spage>2002</spage><epage>2009</epage><pages>2002-2009</pages><issn>0916-8532</issn><eissn>1745-1361</eissn><abstract>Buffer overflow is one of the main approaches to get control of vulnerable programs. This paper presents a protection technique called BFWindow for performance and resource sensitive embedded systems. By coloring data structure in memory with single associate property bit to each byte and extending the target memory block to a BFWindow(2), it validates each memory write by speculatively checking consistency of data properties within the extended buffer window. Property bits are generated by compiler statically and checked by hardware at runtime. They are transparent to users. Experimental results show that the proposed mechanism is effective to prevent sequential memory writes from crossing buffer boundaries which is the common scenario of buffer overflow exploitations. The performance overhead for practical protection mode across embedded system benchmarks is under 1%.</abstract><pub>The Institute of Electronics, Information and Communication Engineers</pub><doi>10.1587/transinf.2015INP0003</doi><tpages>8</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0916-8532 |
ispartof | IEICE Transactions on Information and Systems, 2016/08/01, Vol.E99.D(8), pp.2002-2009 |
issn | 0916-8532 1745-1361 |
language | eng |
recordid | cdi_proquest_miscellaneous_1855386733 |
source | J-STAGE Free; EZB Electronic Journals Library |
subjects | Benchmarks Boundaries buffer overflow Buffers Compilers Computer information security Consistency data property consistency data structure coloring embedded system security Hardware Run time (computers) speculatively checking |
title | BFWindow: Speculatively Checking Data Property Consistency against Buffer Overflow Attacks |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-04T14%3A10%3A17IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=BFWindow:%20Speculatively%20Checking%20Data%20Property%20Consistency%20against%20Buffer%20Overflow%20Attacks&rft.jtitle=IEICE%20Transactions%20on%20Information%20and%20Systems&rft.au=RAO,%20Jinli&rft.date=2016&rft.volume=E99.D&rft.issue=8&rft.spage=2002&rft.epage=2009&rft.pages=2002-2009&rft.issn=0916-8532&rft.eissn=1745-1361&rft_id=info:doi/10.1587/transinf.2015INP0003&rft_dat=%3Cproquest_cross%3E1855386733%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1855386733&rft_id=info:pmid/&rfr_iscdi=true |