Abstract
Temporal memory errors, such as use-after-free bugs, are increasingly popular among attackers and their exploitation is hard to stop efficiently using current techniques. We present a new design, called Type-After-Type, which builds on abstractions in production allocators to provide complete temporal type safety for C/C++ programs-ensuring that memory reuse is always type safe-and efficiently hinder temporal memory attacks. Type-After-Type uses static analysis to determine the types of all heap and stack allocations, and replaces regular allocations with typed allocations that never reuse memory previously used by other types. On the heap, Type-After-Type splits available memory into separate pools for each type. For the stack, Type-After-Type efficiently implements type-safe memory reuse for the first time, pushing variables on separate stacks according to their types, unless they are provably safe (e.g., their address is not taken), in which case they are zero-initialized and kept on a special stack. In our evaluation, we show that Type-After-Type stops a variety of real-world temporal memory attacks and on SPEC CPU2006 incurs a performance overhead of 4.3% and a memory overhead of 17.4% (geomean).
| Original language | English |
|---|---|
| Title of host publication | ACSAC '18 |
| Subtitle of host publication | Proceedings of the 34th Annual Computer Security Applications Conference |
| Publisher | Association for Computing Machinery |
| Pages | 17-27 |
| Number of pages | 11 |
| ISBN (Electronic) | 9781450365697 |
| DOIs | |
| Publication status | Published - 2018 |
| Event | 34th Annual Computer Security Applications Conference, ACSAC 2018 - San Juan, United States Duration: 3 Dec 2018 → 7 Dec 2018 |
Conference
| Conference | 34th Annual Computer Security Applications Conference, ACSAC 2018 |
|---|---|
| Country/Territory | United States |
| City | San Juan |
| Period | 3/12/18 → 7/12/18 |
Funding
We would like to thank the anonymous reviewers for their comments. This project was supported by the European Union's Horizon 2020 research and innovation programme under grant agreement No. 786669 (ReAct), by the United States Office of Naval Research (ONR) under contract N00014-17-1-2782, by Cisco Systems, Inc. through grant #1138109, and by the Netherlands Organisation for Scientific Research through grants NWO 639.023.309 VICI “Dowsing” and NWO 639.021.753 VENI “PantaRhei”. This paper reflects only the authors' view. The funding agencies are not responsible for any use that may be made of the information it contains.
| Funders | Funder number |
|---|---|
| Cisco Systems | 1138109 |
| Horizon 2020 Framework Programme | 786669 |
| European Geosciences Union | N00014-17-1-2782 |
| Nederlandse Organisatie voor Wetenschappelijk Onderzoek | NWO 639.023.309, NWO 639.021.753 |
Keywords
- Computer systems
- Defense
- LLVM
- Uninitialized read
- Use-after-free