DocumentCode
2900749
Title
Embedded TaintTracker: Lightweight Tracking of Taint Data against Buffer Overflow Attacks
Author
Lin, Ying-Dar ; Wu, Fan-Cheng ; Tze-Yau Huang ; Lai, Yuan-Cheng ; Lin, Frank C.
Author_Institution
Dept. of Comput. Sci. & Inf. Eng., Nat. Chiao Tung Univ., Hsinchu, Taiwan
fYear
2010
fDate
23-27 May 2010
Firstpage
1
Lastpage
5
Abstract
Taint tracking is a novel technique to prevent buffer overflow. Previous studies on taint tracking ran a victim´s program on an emulator to dynamically instrument the code for tracking the propagation of taint data in memory and checking whether malicious code is executed. However, the critical problem of this approach is its heavy performance overhead. This paper proposes a new taint-style system called Embedded TaintTracker to eliminate the overhead in the emulator and dynamic instrumentation by compressing a checking mechanism into the operating system (OS) kernel and moving the instrumentation from runtime to compilation time. Results show that the proposed system outperforms the previous work, TaintCheck, by at least 8 times on throughput degradation, and is about 17.5 times faster than TaintCheck when browsing 1KB web pages.
Keywords
Buffer overflow; Degradation; Instruments; Kernel; Operating systems; Optical propagation; Radio access networks; Runtime; Throughput; Web pages;
fLanguage
English
Publisher
ieee
Conference_Titel
Communications (ICC), 2010 IEEE International Conference on
Conference_Location
Cape Town, South Africa
ISSN
1550-3607
Print_ISBN
978-1-4244-6402-9
Type
conf
DOI
10.1109/ICC.2010.5501974
Filename
5501974
Link To Document