Proceedings of the 2012 International Symposium on Software Testing and Analysis 2012
DOI: 10.1145/2338965.2336769
|View full text |Cite
|
Sign up to set email alerts
|

Undangle: early detection of dangling pointers in use-after-free and double-free vulnerabilities

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
92
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 123 publications
(94 citation statements)
references
References 18 publications
0
92
0
Order By: Relevance
“…Dynamic heap monitoring, like that used in Undangle [39] and Valgrind [40], can help discover memory errors during testing, but are not suitable for deployment as they can impose up to 25x performance overhead, which is unacceptable for the applications we aim to protect. The DieHard [3], [41] custom memory manager has proven effective at providing probabilistic guarantees against several classes of memory errors, including heap-based buffer overflows and use-afterfree errors by randomizing and spreading out the heap.…”
Section: Memory Allocators and Dynamic Heap Monitoringmentioning
confidence: 99%
“…Dynamic heap monitoring, like that used in Undangle [39] and Valgrind [40], can help discover memory errors during testing, but are not suitable for deployment as they can impose up to 25x performance overhead, which is unacceptable for the applications we aim to protect. The DieHard [3], [41] custom memory manager has proven effective at providing probabilistic guarantees against several classes of memory errors, including heap-based buffer overflows and use-afterfree errors by randomizing and spreading out the heap.…”
Section: Memory Allocators and Dynamic Heap Monitoringmentioning
confidence: 99%
“…Many approaches that detect buffer overflows, use-after-free or double-free attacks (Valgrind, http://valgrind.org; Hastings and Joyce 1992;Dhurjati and Adve 2006;Caballero et al 2012;Slowinska et al 2012) rely on information about the programs' data structures-specifically, the buffers that they should protect. Thus, in the presence of CMAs, their scope is limited to memory chunks obtained from the general-purpose allocators.…”
Section: Custom Memory Allocationmentioning
confidence: 99%
“…In addition, researchers have shown that knowledge of memory allocation and deallocation routines is useful for retrofitting security in existing binaries-for instance to protect against memory corruption (valgrind, http://valgrind.org;Hastings and Joyce 1992;Dhurjati and Adve 2006;Caballero et al 2012; Perence, B: Electric Fence, http://perens.com/FreeSoftware/ ElectricFence; Slowinska et al 2012). Currently, these security measures are powerless if the application uses CMAs.…”
Section: Introductionmentioning
confidence: 99%
“…• Detection modules: 7 8 9 10 The detection modules identify the actual CMA API: c malloc, c free, and c realloc. MemBrush's algorithms check for the characteristic features discussed in Section II-B, and search for the routines in turn.…”
Section: A Bird's Eye View Of Membrushmentioning
confidence: 99%