论文标题
DANGKILLER:通过隐式标识符有效地消除悬空的指针
DangKiller: Eliminating Dangling Pointers Efficiently via Implicit Identifier
论文作者
论文摘要
无用的漏洞,使攻击者能够通过悬空指针访问意外的内存,这更具威胁性。但是,大多数检测方案只能检测到悬而未决的指针并无效,但不能提供容忍机制来修复运行时的错误。同样,这些技术通过复杂的结构和过多的扫描(扫描)获得并管理元数据。本文的目的是使用编译器仪器自动有效地消除悬空的指针。在本文中,我们观察到大多数技术缺乏准确的有效指针图元数据维护方法,因此他们需要扫描日志以减少冗余并扫整整个地址空间以找到悬空的指针。而且,他们缺乏直接,有效地获得元数据的方法。本文的关键见解是,唯一的标识符可以用作哈希或直接映射算法的关键。因此,本文与每个内存对象及其相应的参考词保持相同的隐式标识符。将唯一的ID与元数据相关联,以进行内存对象,获取和管理指针图元数据。因此,随着延迟的自由技术采用了C/C ++,我们将Dangkiller作为一种新颖且轻巧的悬空指针消除解决方案。我们首先演示了MinFat指针,该指针可以快速计算每个对象和指针的唯一隐式ID,并使用哈希算法获取元数据。其次,我们根据ID提出日志缓存和对数压缩机制,以减少悬挂指针候选者的冗余。再加上ARM64系统上的地址标记架构,我们的实验表明,Dangkiller可以分别在Spec CPU2006和2017基准的11%和3%的运行时开销中消除无用的无用漏洞,除独特的情况外。
Use-After-Free vulnerabilities, allowing the attacker to access unintended memory via dangling pointers, are more threatening. However, most detection schemes can only detect dangling pointers and invalid them, but not provide a tolerance mechanism to repair the errors at runtime. Also, these techniques obtain and manage the metadata inefficiently with complex structures and too much scan (sweep). The goal of this paper is to use compiler instrumentation to eliminate dangling pointers automatically and efficiently. In this paper, we observe that most techniques lack accurate efficient pointer graph metadata maintaining methods, so they need to scan the log to reduce the redundancy and sweep the whole address space to find dangling pointers. Also, they lack a direct, efficiently obtaining metadata approach. The key insight of this paper is that a unique identifier can be used as a key to a hash or direct-map algorithm. Thus, this paper maintains the same implicit identifier with each memory object and its corresponding referent. Associating the unique ID with metadata for memory objects, obtaining and managing the pointer graph metadata can be efficiently. Therefore, with the delayed free technique adopted into C/C++, we present the DangKiller as a novel and lightweight dangling pointer elimination solution. We first demonstrate the MinFat Pointer, which can calculate unique implicit ID for each object and pointer quickly, and use hash algorithm to obtain metadata. Secondly, we propose the Log Cache and Log Compression mechanism based on the ID to decrease the redundancy of dangling pointer candidates. Coupled with the Address Tagging architecture on an ARM64 system, our experiments show that the DangKiller can eliminate use-after-free vulnerabilities at only 11% and 3% runtime overheads for the SPEC CPU2006 and 2017 benchmarks respectively, except for unique cases.