Static secure page allocation for light-weight dynamic information flow tracking
datacite.rights | http://purl.org/coar/access_right/c_16ec | |
dc.creator | Santos J.C.M. | |
dc.creator | Fei Y. | |
dc.creator | Shi Z.J. | |
dc.date.accessioned | 2020-03-26T16:32:55Z | |
dc.date.available | 2020-03-26T16:32:55Z | |
dc.date.issued | 2012 | |
dc.description.abstract | Dynamic information flow tracking (DIFT) is an effective security countermeasure for both low-level memory corruptions and high-level semantic attacks. However, many software approaches suffer large performance degradation, and hardware approaches have high logic and storage overhead. We propose a flexible and light-weight hardware/software co-design approach to perform DIFT based on secure page allocation. Instead of associating every data with a taint tag, we aggregate data according to their taints, i.e., putting data with different attributes in separate memory pages. Our approach is a compiler-aided process with architecture support. The implementation and analysis show that the memory overhead is little, and our approach can protect critical information, including return address, indirect jump address, and system call IDs, from being overwritten by malicious users. Copyright 2012 ACM. | eng |
dc.description.sponsorship | ACM Spec. Interest Group Microarchitectural Res.;Process. (SIGMICRO);ACM Special Interest Group on Embedded Systems (SIGBED);ACM Special Interest Group on Design Automation (SIGDA) | |
dc.format.medium | Recurso electrónico | |
dc.format.mimetype | application/pdf | |
dc.identifier.citation | CASES'12 - Proceedings of the 2012 ACM International Conference on Compilers, Architectures and Synthesis for Embedded Systems, Co-located with ESWEEK; pp. 27-36 | |
dc.identifier.doi | 10.1145/2380403.2380415 | |
dc.identifier.instname | Universidad Tecnológica de Bolívar | |
dc.identifier.isbn | 9781450314244 | |
dc.identifier.orcid | 26325154200 | |
dc.identifier.orcid | 7103059457 | |
dc.identifier.orcid | 35225236800 | |
dc.identifier.reponame | Repositorio UTB | |
dc.identifier.uri | https://hdl.handle.net/20.500.12585/9091 | |
dc.language.iso | eng | |
dc.relation.conferencedate | 7 October 2012 through 12 October 2012 | |
dc.relation.conferenceplace | Tampere | |
dc.rights.accessrights | info:eu-repo/semantics/restrictedAccess | |
dc.rights.cc | Atribución-NoComercial 4.0 Internacional | |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/4.0/ | |
dc.source | https://www.scopus.com/inward/record.uri?eid=2-s2.0-84869031279&doi=10.1145%2f2380403.2380415&partnerID=40&md5=43847ed3df6018aa90812c8dcf0c6dff | |
dc.source | Scopus2-s2.0-84869031279 | |
dc.source.event | 2012 ACM International Conference on Compilers, Architectures and Synthesis for Embedded Systems, CASES 2012, Co-located with 8th Embedded Systems Week, ESWEEK 2012 | |
dc.subject.keywords | Dynamic information flow tracking | |
dc.subject.keywords | Security attacks | |
dc.subject.keywords | Static control flow analysis | |
dc.subject.keywords | Critical information | |
dc.subject.keywords | Dynamic information flow tracking | |
dc.subject.keywords | Hardware-software codesign | |
dc.subject.keywords | High level semantics | |
dc.subject.keywords | Light weight | |
dc.subject.keywords | Memory corruption | |
dc.subject.keywords | Memory overheads | |
dc.subject.keywords | Memory pages | |
dc.subject.keywords | Page allocation | |
dc.subject.keywords | Performance degradation | |
dc.subject.keywords | Security attacks | |
dc.subject.keywords | Security countermeasures | |
dc.subject.keywords | Software approach | |
dc.subject.keywords | Static control | |
dc.subject.keywords | Storage overhead | |
dc.subject.keywords | System calls | |
dc.subject.keywords | Embedded systems | |
dc.subject.keywords | Hardware | |
dc.subject.keywords | Program compilers | |
dc.subject.keywords | Semantics | |
dc.subject.keywords | Digital storage | |
dc.title | Static secure page allocation for light-weight dynamic information flow tracking | |
dc.type.driver | info:eu-repo/semantics/conferenceObject | |
dc.type.hasversion | info:eu-repo/semantics/publishedVersion | |
dc.type.spa | Conferencia | |
dcterms.bibliographicCitation | Chang, W., Streiff, B., Lin, C., Efficient and extensible security enforcement using dynamic data flow analysis (2008) Proc. Conf. Computer & Communications Security, pp. 39-50. , Oct | |
dcterms.bibliographicCitation | Chen, H., Wu, X., Yuan, L., Zang, B., Yew, P.-C., Chong, F.T., From speculation to security: Practical and efficient information flow tracking using speculative hardware (2008) Proc. Int. Symp. Computer Architecture, pp. 401-412. , June | |
dcterms.bibliographicCitation | Chen, S., Kozuch, M., Strigkos, T., Falsafi, B., Gibbons, P.B., Mowry, T.C., Ramachandran, V., Vlachos, E., Flexible hardware acceleration for instruction-grain program monitoring (2008) Proc. Int. Symp. Computer Architecture, pp. 377-388. , Jun | |
dcterms.bibliographicCitation | Chiueh, T.-C., Hsu, F.-H., RAD: A compile-time solution to buffer overflow attacks (2001) Proc. Int Conf. Distributed Computing Systems, pp. 409-417. , Apr | |
dcterms.bibliographicCitation | Cowen, C., Pu, C., Maier, D., Hinton, H., Walpole, J., Bakke, P., Beattie, S., Zhang, Q., StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks (1998) Proc. USENIX Security Symp., pp. 63-78. , Jan | |
dcterms.bibliographicCitation | Crandall, J.R., Wu, S.F., Chong, F.T., Minos: Architectural support for protecting control data (2006) ACM Tran. Architecture & Code Optimization, 3 (4), pp. 359-389. , Dec | |
dcterms.bibliographicCitation | Dalton, M., Kannan, H., Kozyrakis, C., Raksha: A flexible flow architecture for software security (2007) Proc. Int. Symp. Computer Architecture, pp. 482-293. , June | |
dcterms.bibliographicCitation | Focus, S., (2001) Ssh crc-32 Compensation Attack Detector Vulnerability, , http://www.securityfocus.com/bid/2347/ | |
dcterms.bibliographicCitation | Frantzen, M., Shuey, M., StackGhost: Hardware facilitated stack protection (2001) Proc. USENIX Security Symp., pp. 55-66. , Aug | |
dcterms.bibliographicCitation | Ho, A., Fetterman, M., Clark, C., Warfield, A., Hand, S., Practical taint-based protection using demand emulation (2006) EUROSYS '06 | |
dcterms.bibliographicCitation | Huang, R., Deng, D.Y., Suh, G.E., Orthrus: Efficient software integrity protection on multi-cores (2010) Comput. Archit. News, 38 (1), pp. 371-384 | |
dcterms.bibliographicCitation | (2010) Imperva. Securesphere and Owasp 2010 Top Ten Most Critical Web Application Security Risks, , http://www.imperva.com/docs/TB_SecureSphere_OWASP_2010-Top-Ten.pdf | |
dcterms.bibliographicCitation | Isaev, I.K., Sidorov, D.V., The use of dynamic analysis for generation of input data that demonstrates critical bugs and vulnerabilities in programs (2010) Programming and Computer Software, 36 (4), pp. 225-236. , Sept | |
dcterms.bibliographicCitation | Kannan, H., Ordering decoupled metadata accesses in multiprocessors (2009) Proc. Int. Symp. Microarchitecture, pp. 381-390. , Dec | |
dcterms.bibliographicCitation | Katsunuma, S., Kurita, H., Shioya, R., Shimizu, K., Irie, H., Goshima, M., Sakai, S., Base address recognition with data flow tracking for injection attack detection (2006) Proc. Pacific Rim Inter. Symp. Dependable Computing, pp. 165-172. , Dec | |
dcterms.bibliographicCitation | Lam, L.C., Chiueh, T.-C., A general dynamic information flow tracking framework for security applications (2006) Proc. Annual Computer Security Applications Conf., pp. 463-472. , Dec | |
dcterms.bibliographicCitation | Livshits, B., Martin, M., Lam, M.S., Securifly: Runtime protection and recovery from web application vulnerabilities (2006) Technical Report, Stanford University | |
dcterms.bibliographicCitation | Martinez Santos, J.C., Fei, Y., Leveraging speculative architectures for run-time program validation (2008) Proc. Int. Conf. Computer Design, pp. 498-505. , Oct | |
dcterms.bibliographicCitation | Martinez Santos, J.C., Fei, Y., Shi, Z.J., Pift: Efficient dynamic information flow tracking using secure page allocation (2009) Proc. WkShp on Embedded Systems Security, pp. 61-68. , Oct | |
dcterms.bibliographicCitation | Nethercote, N., Seward, J., Valgrind: A framework for heavyweight dynamic binary instrumentation (2007) Proc. Conference on Programming Language Design & Implementation, pp. 89-100. , Jun | |
dcterms.bibliographicCitation | Nightingale, E.B., Peek, D., Chen, P.M., Flinn, J., Parallelizing security checks on commodity hardware (2008) Proc. Int. Conf. Architectural Support for Programming Languages & Operating Systems, pp. 308-318. , Mar | |
dcterms.bibliographicCitation | Pozza, D., Sisto, R., A lightweight security analyzer inside gcc (2008) Proc. Int. Conf. Availability, Reliability & Security, pp. 851-858 | |
dcterms.bibliographicCitation | Qin, F., Wang, C., Li, Z., Seop Kim, H., Zhou, Y., Wu, Y., LIFT: A low-overhead practical information flow tracking system for detecting security attacks (2006) IEEE/ACM Int. Symp. on Microarchitecture, pp. 135-148. , Dec | |
dcterms.bibliographicCitation | Ruwase, O., Gibbons, P.B., Mowry, T.C., Ramachandran, V., Chen, S., Kozuch, M., Ryan, M., Parallelizing dynamic information flow tracking (2008) Proc. Annual Symp. Parallelism in Algorithms & Architectures, pp. 35-45. , Jun | |
dcterms.bibliographicCitation | Shi, W., Fryman, J., Gu, G., Lee, H.-H., Zhang, Y., Yang, J., InfoShield: A security architecture for protecting information usage in memory (2006) Int. Symp. on High-Performance Computer Architecture, pp. 222-231. , Feb | |
dcterms.bibliographicCitation | Sophia, I., Méditerranée, A., Antipolis, S., Secure slices of insecure programs categories and subject descriptors (2008) Language, pp. 112-122. , Mar | |
dcterms.bibliographicCitation | Sotirov, A., (2005) Automatic Vulnerability Detection Using Static Source Code Analysis, , PhD thesis, University of Alabama | |
dcterms.bibliographicCitation | (2000) SPEC CINT 2000, , http://www.spec.org/cpu2000/CINT2000/, Benchmarks | |
dcterms.bibliographicCitation | Suh, G.E., Lee, J.W., Zhang, D., Devadas, S., Secure program execution via dynamic information flow tracking (2004) Proc. Int. Conf. on Architectural Support for Programming Languages & Operating Systems, pp. 85-96 | |
dcterms.bibliographicCitation | Vachharajani, N., Bridges, M.J., Chang, J., Rangan, R., Ottoni, G., Blome, J.A., Reis, G.A., August, D.I., RIFLE: An architectural framework for user-centric information-flow security (2004) Proc. Int. Symp. Microarchitecture, pp. 243-254 | |
dcterms.bibliographicCitation | Venkataramani, G., Doudalis, I., Solihin, Y., Prvulovic, M., Flexitaint: A programmable accelerator for dynamic taint propagation (2008) Proc. Int. Symp. High-Performance Computer Architecture, pp. 173-184. , Feb | |
dcterms.bibliographicCitation | Wilander, J., Kamkar, M., (2002) A Comparison of Publicly Available Tools for Static Intrusion Prevention | |
dcterms.bibliographicCitation | Xu, J., Nakka, N., Defeating memory corruption attacks via pointer taintedness detection (2005) Proc. Int. Conf. on Dependable Systems & Networks, pp. 378-387 | |
dcterms.bibliographicCitation | Xu, W., Bhatkar, S., Sekar, R., Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks (2006) Proc. USENIX Security Symp., pp. 121-136. , July-Aug | |
dcterms.bibliographicCitation | Younan, Y., Joosen, W., Piessens, F., Efficient protection against heap-based buffer overflows without resorting to magic (2006) Proc. Int. Conf. on Information & Communication Security, , Dec | |
dcterms.bibliographicCitation | Younan, Y., Pozza, D., Piessens, F., Joosen, W., Extended protection against stack smashing attacks without performance loss (2006) Proc. Annual Computer Security Applications Conf., pp. 429-438. , Dec | |
oaire.resourceType | http://purl.org/coar/resource_type/c_c94f | |
oaire.version | http://purl.org/coar/version/c_970fb48d4fbd8a85 |