Loading...
Please wait, while we are loading the content...
Similar Documents
Automated Format String Attack Prevention for Win 32 / X 86 Binaries
| Content Provider | Semantic Scholar |
|---|---|
| Copyright Year | 2007 |
| Abstract | A format string attack exploits the fact that functions with a variable number of input arguments such as printf() determine the exact number of input arguments used in a call based on the format string argument, and compromises the victim application’s address space by accessing data areas beyond the original input argument list the caller prepares. Although there have been several attempts that aim to protect application programs from format string attacks, all of them are limited in one way or another. Moreover, none of them has been applied to commercially distributed Win32 binaries. This paper describes the design, implementation and evaluation of a Win32 binary transformation tool called Lisbon, which transparently inserts into Win32 binaries additional checks that protect them from all format string vulnerabilities announced in public security advisory lists. Lisbon casts the format string attack prevention problem as an input argument list bound checking problem. To reduce the run-time checking overhead, Lisbon exploits the debug register hardware, which is available in most mainstream CPUs including Intel’s X86 architecture, to detect if a callee accesses data outside the input argument list. Moreover, Lisbon is able to detect format string attacks without interpreting their format strings and is thus potentially applicable to similar attacks against other functions that access input arguments in the same way as printf(). The run-time throughput penalty of the first Lisbon prototype is under 2% for a set of test network applications that are known to be vulnerable to format string attacks. |
| File Format | PDF HTM / HTML |
| Alternate Webpage(s) | http://www.ecsl.cs.sunysb.edu/tr/TR244.pdf |
| Language | English |
| Access Restriction | Open |
| Subject Keyword | Address space Binary code Binary file Buffer overflow Buffers CASP8 and FADD-Like Apoptosis Regulator Protein Caller ID Cash Central processing unit Checking (action) Compiler Integer (number) Integer overflow Memory Disorders Memory corruption Microsoft Windows Overhead (computing) Printf format string Prototype Runtime error detection Source Code Throughput Uncontrolled format string X86 debug register |
| Content Type | Text |
| Resource Type | Article |