• DocumentCode
    2900749
  • Title

    Embedded TaintTracker: Lightweight Tracking of Taint Data against Buffer Overflow Attacks

  • Author

    Lin, Ying-Dar ; Wu, Fan-Cheng ; Tze-Yau Huang ; Lai, Yuan-Cheng ; Lin, Frank C.

  • Author_Institution
    Dept. of Comput. Sci. & Inf. Eng., Nat. Chiao Tung Univ., Hsinchu, Taiwan
  • fYear
    2010
  • fDate
    23-27 May 2010
  • Firstpage
    1
  • Lastpage
    5
  • Abstract
    Taint tracking is a novel technique to prevent buffer overflow. Previous studies on taint tracking ran a victim´s program on an emulator to dynamically instrument the code for tracking the propagation of taint data in memory and checking whether malicious code is executed. However, the critical problem of this approach is its heavy performance overhead. This paper proposes a new taint-style system called Embedded TaintTracker to eliminate the overhead in the emulator and dynamic instrumentation by compressing a checking mechanism into the operating system (OS) kernel and moving the instrumentation from runtime to compilation time. Results show that the proposed system outperforms the previous work, TaintCheck, by at least 8 times on throughput degradation, and is about 17.5 times faster than TaintCheck when browsing 1KB web pages.
  • Keywords
    Buffer overflow; Degradation; Instruments; Kernel; Operating systems; Optical propagation; Radio access networks; Runtime; Throughput; Web pages;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Communications (ICC), 2010 IEEE International Conference on
  • Conference_Location
    Cape Town, South Africa
  • ISSN
    1550-3607
  • Print_ISBN
    978-1-4244-6402-9
  • Type

    conf

  • DOI
    10.1109/ICC.2010.5501974
  • Filename
    5501974