Abstract
Programming languages permitting immediate memory accesses through pointers often result in applications having memory-related errors, which may lead to unpredictable failures and security vulnerabilities. A light-weight solution is presented in this paper to tackle such illegal memory accesses dynamically in C/C++ based applications. We propose a new and effective method of instrumenting an application's source code at compile time in order to detect out-of-bound memory accesses. It is based on creating tags, to be coupled with each memory allocation and then placing additional tag checking instructions for each access made to the memory. The proposed solution is evaluated by instrumenting applications from the BugBench benchmark suite and publicly available benchmark software, Runtime Intrusion Prevention Evaluator (RIPE), detecting all the bugs successfully. The performance and memory overhead is further analysed by instrumenting and executing real world applications.
Original language | English |
---|---|
Title of host publication | Proceedings of the Third Workshop on Cryptography and Security in Computing Systems |
Subtitle of host publication | CS2 '16 |
Publisher | Association for Computing Machinery |
Pages | 31-36 |
Number of pages | 6 |
ISBN (Electronic) | 978-1-4503-4065-6 |
DOIs | |
Publication status | Published - 2016 |
Event | Third Workshop on Cryptography and Security in Computing Systems - Prague, United Kingdom Duration: 20 Jan 2016 → … |
Conference
Conference | Third Workshop on Cryptography and Security in Computing Systems |
---|---|
Abbreviated title | CS2 '16 |
Country/Territory | United Kingdom |
City | Prague |
Period | 20/01/16 → … |