Type Casting Verification: Stopping an Emerging Attack Vector
نویسندگان
چکیده
Many applications such as the Chrome and Firefox browsers are largely implemented in C++ for its performance and modularity. Type casting, which converts one type of an object to another, plays an essential role in enabling polymorphism in C++ because it allows a program to utilize certain general or specific implementations in the class hierarchies. However, if not correctly used, it may return unsafe and incorrectly casted values, leading to so-called bad-casting or type-confusion vulnerabilities. Since a bad-casted pointer violates a programmer’s intended pointer semantics and enables an attacker to corrupt memory, bad-casting has critical security implications similar to those of other memory corruption vulnerabilities. Despite the increasing number of bad-casting vulnerabilities, the bad-casting detection problem has not been addressed by the security community. In this paper, we present CAVER, a runtime bad-casting detection tool. It performs program instrumentation at compile time and uses a new runtime type tracing mechanism—the type hierarchy table—to overcome the limitation of existing approaches and efficiently verify type casting dynamically. In particular, CAVER can be easily and automatically adopted to target applications, achieves broader detection coverage, and incurs reasonable runtime overhead. We have applied CAVER to largescale software including Chrome and Firefox browsers, and discovered 11 previously unknown security vulnerabilities: nine in GNU libstdc++ and two in Firefox, all of which have been confirmed and subsequently fixed by vendors. Our evaluation showed that CAVER imposes up to 7.6% and 64.6% overhead for performance-intensive benchmarks on the Chromium and Firefox browsers, respectively.
منابع مشابه
Verification of a CFD solver in near ground effect for aerodynamic behavior of airfoil NACA 0015
Numerical investigation was performed on NACA 0015 which is a symmetric airfoil. Pressure distribution and then lift and drag forces are verified. Changing of ground clearance was a considerable point. Also the angle of attack was changed from 0° to 10°. Pressure coefficient reaches its higher amounts on the wing lower surface when the ground clearance diminishes. Increment of the angle of atta...
متن کاملNumerical investigation of stopping maneuver for two by reversing propeller at different speeds
Maneuverability is an important aspect of marine vehicle design. With the development and utilization of ocean resources, maritime transportation is becoming increasingly busy. Stopping ability has great effect on the safety of ship maneuvering for those large ships. Therefore, it is necessary to study the behavior of the ship during the stopping maneuver to ensure the safety of navigation. In ...
متن کاملSkilled Impostor Attacks Against Fingerprint Verification Systems And Its Remedy
Fingerprint verification systems are becoming ubiquitous in everyday life. This trend is propelled especially by the proliferation of mobile devices with fingerprint sensors such as smartphones and tablet computers, and fingerprint verification is increasingly applied for authenticating financial transactions. In this study we describe a novel attack vector against fingerprint verification syst...
متن کاملAn Introduction to a New Criterion Proposed for Stopping GA Optimization Process of a Laminated Composite Plate
Several traditional stopping criteria in Genetic Algorithms (GAs) are applied to the optimization process of a typical laminated composite plate. The results show that neither of the criteria of the type of statistical parameters, nor those of the kinds of theoretical models performs satisfactorily in determining the interruption point for the GA process. Here, considering the configuration of ...
متن کاملSecuring Speaker Verification System Against Replay Attack
In this paper, we present a framework to combat replay attack (RA) in a speaker verification (SV) system. Although the problem of SV system vulnerabilities is not new, however, dramatic improvements in both SV systems and attack models have renewed interest in this area. We have shown that the replay attack can be modeled using a nonlinear transfer function. Higher-order spectral analysis is co...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015