Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security 2017
DOI: 10.1145/3133956.3133957
|View full text |Cite
|
Sign up to set email alerts
|

FreeGuard

Abstract: In spite of years of improvements to software security, heap-related attacks still remain a severe threat. One reason is that many existing memory allocators fall short in a variety of aspects. For instance, performance-oriented allocators are designed with very limited countermeasures against attacks, but secure allocators generally su er from signi cant performance overhead, e.g., running up to 10× slower. This paper, therefore, introduces FreeGuard, a secure memory allocator that prevents or reduces a wide … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 41 publications
(3 citation statements)
references
References 21 publications
0
3
0
Order By: Relevance
“…However, they incur excessive performance (e.g., 55 % in DangNull, 25 % in FreeSentry, and 41 % in DangSan) to the system in constantly maintaining their dedicated data structures that keep track of the referring relationships between objects and pointers. To reduce performance overhead, a deferred free scheme [6], [7] has been devised that intentionally delays the reuse of freed objects' memory, inspired by the fact that UAF attacks will be launched shortly after objects are freed. This scheme can be implemented easily by placing the freed objects in quarantine memory for a while.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…However, they incur excessive performance (e.g., 55 % in DangNull, 25 % in FreeSentry, and 41 % in DangSan) to the system in constantly maintaining their dedicated data structures that keep track of the referring relationships between objects and pointers. To reduce performance overhead, a deferred free scheme [6], [7] has been devised that intentionally delays the reuse of freed objects' memory, inspired by the fact that UAF attacks will be launched shortly after objects are freed. This scheme can be implemented easily by placing the freed objects in quarantine memory for a while.…”
Section: Related Workmentioning
confidence: 99%
“…UAFs are prevalent across applications, as demonstrated in the statistical report of the MITRE where it ranks among the top 25 most dangerous software errors [1]. To date, a lot of techniques [2], [3], [4], [5], [6], [7], [8], [9], [10], [11], [12], [13], [14], [15], [16], [17] have been invented to stymie UAF attacks in question.…”
Section: Introductionmentioning
confidence: 99%
“…If a chunk is freed while the program still has a pointer, such a dangling pointer can be misused to corrupt an object that reuses the chunk. Many software products are reported to have this class of vulnerability [5,6,7] despite the large mitigation effort [11,12,15,16,17,19,23,25,26,27,28,29,30,31,32,34,36]. The prevalence and severity of the threat even motivates the industry to migrate the existing software products into other * Corresponding Author languages such as Rust [22,33,35], which prevents the useafter-free vulnerabilities as one of its design goals.…”
Section: Introductionmentioning
confidence: 99%