Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1109/DEPEND.2009.33guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

TMAC: Taint-Based Memory Protection via Access Control

Published: 18 June 2009 Publication History

Abstract

Memory corruption attacks account for most parts of malicious attacks toward software security. Recently dynamic taint analysis is proposed and is gaining momentum. This proposed technique attempts to defeat attacks by checking the taintedness and integrity of pointers when accessing memory since vulnerabilities are always motivated by tainting pointers. Unfortunately, there exists some class of attacks without tainting pointers, such as array bounds violation attacks using pointers. In this paper, we propose a novel approach to defeat this kind of undetected attacks using taint-based tracking analysis. Our notion is based on the memory access control, that is, first, we will check the taintedness of the pointers when accessing memory like existing taint-based approaches, second, we will check whether or not the memory area is in the legitimate range of a pointer used to access this memory. Our implementation dose not need source code and is based on Valgrind, hence works on commodity software. To demonstrate our idea, we performed a preliminary empirical experiments, the results are quite promising: TMAC can effectively detect a wide range of attacks, and the average runtime overhead is close to Memcheck, a widely memory error detector.

Cited By

View all
  • (2022)Detecting violations of access control and information flow policies in data flow diagramsJournal of Systems and Software10.1016/j.jss.2021.111138184:COnline publication date: 1-Feb-2022

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
DEPEND '09: Proceedings of the 2009 Second International Conference on Dependability
June 2009
171 pages
ISBN:9780769536668

Publisher

IEEE Computer Society

United States

Publication History

Published: 18 June 2009

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2022)Detecting violations of access control and information flow policies in data flow diagramsJournal of Systems and Software10.1016/j.jss.2021.111138184:COnline publication date: 1-Feb-2022

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media