DocumentCode :
2900749
Title :
Embedded TaintTracker: Lightweight Tracking of Taint Data against Buffer Overflow Attacks
Author :
Lin, Ying-Dar ; Wu, Fan-Cheng ; Tze-Yau Huang ; Lai, Yuan-Cheng ; Lin, Frank C.
Author_Institution :
Dept. of Comput. Sci. & Inf. Eng., Nat. Chiao Tung Univ., Hsinchu, Taiwan
fYear :
2010
fDate :
23-27 May 2010
Firstpage :
1
Lastpage :
5
Abstract :
Taint tracking is a novel technique to prevent buffer overflow. Previous studies on taint tracking ran a victim´s program on an emulator to dynamically instrument the code for tracking the propagation of taint data in memory and checking whether malicious code is executed. However, the critical problem of this approach is its heavy performance overhead. This paper proposes a new taint-style system called Embedded TaintTracker to eliminate the overhead in the emulator and dynamic instrumentation by compressing a checking mechanism into the operating system (OS) kernel and moving the instrumentation from runtime to compilation time. Results show that the proposed system outperforms the previous work, TaintCheck, by at least 8 times on throughput degradation, and is about 17.5 times faster than TaintCheck when browsing 1KB web pages.
Keywords :
Buffer overflow; Degradation; Instruments; Kernel; Operating systems; Optical propagation; Radio access networks; Runtime; Throughput; Web pages;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Communications (ICC), 2010 IEEE International Conference on
Conference_Location :
Cape Town, South Africa
ISSN :
1550-3607
Print_ISBN :
978-1-4244-6402-9
Type :
conf
DOI :
10.1109/ICC.2010.5501974
Filename :
5501974
Link To Document :
بازگشت