WO2016014567A1 - Systems and/or methods for automatically protecting against memory corruption vulnerabilities - Google Patents
Systems and/or methods for automatically protecting against memory corruption vulnerabilities Download PDFInfo
- Publication number
- WO2016014567A1 WO2016014567A1 PCT/US2015/041381 US2015041381W WO2016014567A1 WO 2016014567 A1 WO2016014567 A1 WO 2016014567A1 US 2015041381 W US2015041381 W US 2015041381W WO 2016014567 A1 WO2016014567 A1 WO 2016014567A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- memory
- guard
- block
- application program
- access
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/54—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/02—Addressing or allocation; Relocation
- G06F12/0223—User address space allocation, e.g. contiguous or non contiguous base addressing
- G06F12/023—Free address space management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1416—Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights
- G06F12/1425—Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights the protection being physical, e.g. cell, word, block
- G06F12/1441—Protection against unauthorised use of memory or access to memory by checking the object accessibility, e.g. type of access defined by the memory independently of subject rights the protection being physical, e.g. cell, word, block for a range
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/033—Test or assess software
Definitions
- Certain example embodiments described herein relate to techniques for computer software processing. More particularly, certain example embodiments relate to techniques for automatically protecting, or hardening, software against exploits of memory- corruption vulnerabilities.
- Embodiments of the present invention provide a robust and efficient technique for automatically protecting, or hardening, software against exploitation of memory-corruption vulnerabilities.
- An example embodiment provides computing system comprising at least one memory and at least one processor configured to execute a security-enhanced application program.
- the program includes arranging a plurality of guard regions in the memory in relation to data objects formed by the application program, identifying an access by the application program to a guard region arranged in the memory as a disallowed access, and modifying the execution of the application program in response to the identifying.
- the modifying may be in order to prevent exploitation of the memory and/or to correctly execute the application program.
- the identifying an access in example embodiments may include at least one of
- the program may further include placing bipartite guards in the guard regions arranged in memory, the bipartite guards each having a predetermined number of bits.
- the detecting whether a memory access is a disallowed access comprises may include determining an address associated with the memory access, and determining whether at least one of the bipartite guards placed in the guard regions is located at the determined address.
- Placing bipartite guards may in example embodiments include placing a predetermined small guard value in one of the bipartite guards at one or more predetermined offsets. Determining whether at least one of the bipartite guards are located at the determined address may include checking whether the predetermined small guard value is positioned at the determined address.
- the predetermined small guard value may in example embodiments be one byte in size.
- the bipartite guard may be placed in all guard regions when they are created and is removed before the region is reused.
- Determining whether at least one of the bipartite guards are located at the address may in example embodiments further include arranging a computation that may cause a runtime exception if and only if the full guard value is present.
- An example embodiment may in example embodiments further include performing an exclusive-or operation of data in a guard map with a guard value in order to populate a substantially larger portion of the guard map with the guard value.
- the tracking may include at least one of (A) for a portion of the memory that is a stack memory, directly mapping between a region of the stack memory that is being mapped and the map, (B) for a portion of the memory that is a heap memory, using a heap map to infer locations of the guards in the heap, and (C) for a portion of the memory that is a static memory, using standard data structures for representing sets to store a fixed set of said guard regions.
- the tracking may include detecting a reuse of a block in a heap portion of the memory based upon whether (1) the block is returned from a function that sometimes returns uninitialized memory acquired directly from a memory allocation, and/or (2) the block is returned from a function having fewer than a predetermined number of external arguments.
- the tracking may include protecting a first set of areas of the memory using said bipartite guards and without guard maps, and protecting a second set of areas of the memory using homogenous guard values and guard maps.
- the tracking may include, when a data object is freed by the application program, marking a region of the memory used by the data object as a guard region, and wherein the marking includes overwriting the region with guard values.
- freed memory regions are marked with a dedicated unalloc-mem guard value distinct from other classes of guard values and detecting a use-after-free error comprises checking for the unalloc-mem guard value.
- the tracking may include, when a data object is freed by the application program, before said overwriting, saving current contents of the region; and if a subsequent use of the region is detected, restoring the region using the saved contents.
- determining if an access to a memory location computed as (base + offset) is a disallowed access further includes checking if base is in a guard region.
- determining if an access to a memory location computed as (base + offset) is a disallowed access further comprises checking if base and (base + offset) are in the same heap block.
- modifying the execution of the application program includes: automatically determining when a memory overrun occurs by detecting an attempted access of the guard region at the end of a block in a heap portion of the memory; automatically marking another block adjacent to the block as allocated; and/or providing for overrunning code to continue into the marked block.
- modifying the execution of the application program may include automatically determining when a memory overrun occurs by detecting an attempted access one of the guard regions at the end of a first block in a heap portion of the memory, allocating a second block in the heap portion, wherein the second block is larger than the first block, copying data from the first block to the second block, converting the first block into a guard region such that subsequent accesses to the first block are detected as attempted accesses to one of said guard regions, and when a subsequent access to the first block is detected, redirecting the access to instead access the second block.
- Some embodiments may further include inserting read guards in newly allocated memory and/or memory that holds stale data, checking read accesses to determine whether an inserted read guard is accessed, thereby detecting runtime uses of uninitialized memory and/or potential information leaks, and removing an inserted read guard when a write access to the inserted read guard is detected.
- Some embodiments may further include intercepting library calls writing a variable amount of said memory up to a specified maximum, and identifying portions of the memory between the end of said variable amount written and the specified maximum as stale data that the subject program no longer uses. [0026] Some embodiments may further include at least one of (A) detecting an attempted scan of the memory by placing page guards on selected pages, or (B) detecting an attempted scan of the memory by inserting hooks in selected portions of code to check for the page guards.
- An example embodiment provides a method for executing a security-enhanced application program on a computing system comprising at least one memory and at least one processor.
- the method includes: arranging a plurality of guard regions in the memory in relation to data objects formed by the application program, automatically identifying an access by the application program to a guard region arranged in the memory as a disallowed access, and automatically modifying the execution of the application program in response to the identifying.
- the modifying being in order to prevent exploitation of the memory and/or to correctly execute the application program.
- FIG. 1 is a flow chart illustrating the overall process for automatically protecting, or hardening, software against exploits of memory-corruption vulnerabilities, according to one or more embodiments;
- FIG. 2 illustrates an interaction chart illustrating aspects of the preparation stage processing, according to some embodiments;
- FIG. 3 illustrates an interaction chart illustrating aspects of the runtime monitoring stage, according to some embodiments
- FIG. 4 illustrates example pseudo code for checking for a guard value at memory a location, in accordance with some embodiments
- FIG. 5 illustrates example pseudo code for initializing data, in accordance with some embodiments
- FIG. 7 illustrates example pseudo code including constructing a guard, in accordance with some embodiments
- FIG. 8 illustrates an example layout of a bipartite guard, according to some embodiments.
- FIG. 10 illustrates a guard map according to some embodiments.
- FIG. 1 1 illustrates pseudo code for an example technique for checking whether an address is safe, according to some embodiments.
- Certain example embodiments protect software that run on general purpose electronic computing hardware, including personal computers, servers, and embedded devices such as, but not limited to, smart phones or gaming consoles.
- Software applications protected by example embodiments include, but are not limited to, software that manually manage memory resources, for example, by using a combination of a system library procedure, such as malloc, and a runtime stack that is typically maintained by updating one or more dedicated hardware registers.
- Embodiments described herein may use any combination of one or more disclosed techniques for automatically protecting, or hardening, software against exploits of memory-corruption vulnerabilities.
- These techniques include, for example: modifying the application program to change the way it arranges its data, specifically to insert "guard regions" between the application program's data objects; tracking the guard regions as they are created and destroyed (corresponding to the allocation and release of memory regions by the subject program as it executes); checking potentially dangerous memory accesses by the subject program to ensure they are not accessing guard regions in a disallowed manner; tracking additional information about the usage of memory regions to identify when memory is about to be reused and the old contents can be cleared; and/or modifying the program execution when a dangerous access (i.e., access to an area with a guard value) is detected so that the state of the subject application program is not compromised (i.e., exploited), and the application program continues to execute correctly.
- a dangerous access i.e., access to an area with a guard value
- FIG. 1 illustrates a flowchart 100 of a process for protecting software in accordance with example embodiments.
- the process 100 protecting of software against vulnerabilities operates in two stages: a preparation stage 102 and a runtime-monitoring stage 104.
- FIG. 2 shows a flowchart 200 for an implementation of the preparation stage.
- FIG. 3 shows a flowchart 300 for an implementation of the runtime- monitoring stage.
- the preparation stage is typically performed offline (i.e., when the application program is not executing).
- a process at operation 202 uses program analysis to determine characteristics about the application program that is to be protected.
- the application program that the user intends to protect by process 100 is referred to herein as the "subject application program" or simply the "application program”.
- Many different types of program analysis can be applied, including, for example, static and dynamic analysis and source code and machine-code analysis.
- the source code 212 of the application program, and binaries 214 resulting from compiling may be provided as input to the program analysis at operation 202.
- the program analyzer(s) are used to construct a representation of the subject application program.
- the constructed representation is sometimes referred to as an Intermediate Representation (IR) 210.
- the IR 210 may capture some or all of the characteristics such as the following regarding the application program that is being analyzed: instructions that may perform potentially dangerous memory operations, instructions that allocate and deallocate memory, data layout of the program, instructions that directly address globally allocated or stack-allocated data, functions that "recycle" heap- allocated buffers, functions that are “wrappers" for the system's heap-management library, and functions that implement custom memory-management libraries on top of the system's heap-management library.
- Some embodiments identify instructions that perform potentially dangerous memory operations by disassembling all, or some portion of, possible instructions in the binary file and identifying instructions that access memory. Some other embodiments refine this program analysis by assuming that instructions that access a fixed memory location or stack offset is/are safe.
- the data layout of the program can be determined by processing "shape analysis". Shape analysis requires additional analysis of the generated IR 210 to determine which data structure abstractions are used by the application program and how these structures can be written and accessed at run time.
- one or more characteristics of the application program such as those noted above, may be unavailable or inaccurate. In many such cases, embodiments can still operate to protect the system; however, it may provide a degraded level of protection, or require more extensive testing to ensure that the intended functionality of the subject application program is not compromised or broken.
- the generated IR 210 is used to rewrite the subject program's binaries 216, including its executable files and libraries, if any.
- the rewriting operation 204 results in hardened binaries 218 that include protections provided by the embodiments. If test suites are available, they may be used to test the hardened binaries 218 to ensure the intended application program behavior is provided by the hardened binaries 218.
- test suites are available, they may be used to test the hardened binaries 218 to ensure the intended application program behavior is provided by the hardened binaries 218.
- the preparation stage processing 102 can be performed in an offline manner.
- An alternative approach is to perform some or all of the preparation processing steps "on-the-fly" as the user runs the application program.
- the runtime-monitoring stage 104 of protections occur when the protected application program is used (i.e., when the protected application program is executed).
- the protections for the application program and/or system can be implemented, as shown in the flow chart 300, by the hardened libraries 302, hardened executable(s) 304, and/or dedicated libraries 306 that are configured to perform checks for memory-safety violations by interposing between the application program and common system libraries, such as libc.so 308.
- the hardened binaries i.e., are executed
- they implement the protections inserted during the preparation stage 102.
- the hardened binaries 304 may use a hardened runtime program data 310 including, for example, a modified data layout 310 that includes guard regions, maintains metadata of the embodiments, including, for example, current locations of guard regions, and checks for unsafe memory accesses, including accesses that should access the application program's data 310 but are accessing a guard region.
- a hardened runtime program data 310 including, for example, a modified data layout 310 that includes guard regions, maintains metadata of the embodiments, including, for example, current locations of guard regions, and checks for unsafe memory accesses, including accesses that should access the application program's data 310 but are accessing a guard region.
- system libraries 308 that manipulate memory
- some example embodiments may intercept the call in its hardened libraries 306, and perform additional checking and updating of metadata, before calling the underlying library procedure if it is determined to be safe.
- Example embodiments may use a combination of techniques to protect against memory corruption. For example, an embodiment may protect an application program by using one or more of guard regions, clearing stale data, altering de-allocation patterns and actions, taint inference and propagation, and one or more repair strategies.
- Guard regions are regions of memory selectively identified by embodiments as areas that the application program has no valid reason to access. In other words, the application program, if operating correctly as designed, has no reason to access the identified guard areas.
- Embodiments may transform the layout of the application program's data so that guard regions are interspersed with the program's legitimate data.
- the guard regions may be located in memory based on the IR that is generated during the preparation stage. For example, guard regions may be placed at the end of heap blocks, in between procedure activation records, in between data objects on the stack, and/or in between global data objects.
- Some embodiment may also replace instructions or procedure calls that can potentially perform unsafe memory accesses with code that checks that the locations to be accessed are not in guard regions before performing the accesses. Doing so helps ensure that the hardened program accesses data in a safe manner.
- some example embodiments may mark the memory as a guard region.
- the marking may include overwriting the memory with predetermined guard values. Checks for accesses of guarded regions will then detect if the memory is used after it has been freed, but before it has been reallocated (i.e. "use-after-free" fault).
- an additional check of the value held at the base address is inserted to see if it contains an unallocated memory guard. If it does, the heap manager is consulted to determine if base and base + offset are located in the same heap block. If they are located in the same heap-block, a use- after-free error is identified.
- some embodiments may save the current contents of the faulty block, and if a subsequent use of the block is detected, restore the saved contents and mark the block as "in use.”
- Some embodiments may clear stale data in regions that are reused as a technique for protecting against memory corruption.
- Embodiments may use various techniques to recognize when a program is reusing a region of memory. Before reuse of a region occurs, some embodiments may operate to clear the old data and/or convert the region to a class of guard region that indicates that the region should be initialized before being read. Certain example embodiments thus may supplement the garbage collector in a garbage- collected environment such as Java, for example, by inferring and marking used in memory segments. Doing so helps to ensure that data is scrubbed when it is no longer needed, thereby reducing the likelihood that malicious programs may be able to access forgotten-about and/or leaked memory areas and the data stored therein.
- Altering deallocation patterns and actions may, for example, include delaying re-introduction of newly freed memory to the available memory pool.
- example embodiments may delay the return of the memory to the pool of memory available for reuse.
- a memory block is placed in quarantine, for example, after a freeQ on the block, it is converted to a type of guard region that indicates it has been freed and should not be accessed by the subject application program. If some embodiments detect an access to a guard region that is in quarantine after a freeQ, a use-after-free error may be indicated to the user.
- Example embodiments may be able to repair the error by avoiding reallocation of the block.
- Some example embodiments may be configured to use a combination of lightweight taint inference and taint propagation to recognize and/or repair certain classes of dangerous memory-usage errors such as use of uninitialized memory and buffer overruns.
- an example embodiment When an example embodiment detects that a memory-corruption error is about to occur, it may use a variety of repair techniques to counter the threat. These include replacing the values that would be returned by an errant memory read and early termination of errant computation (e.g., in a loop, thread, or process). An embodiment may also report potential memory-corruption errors, which then allows administrators to check for attacks and allows developers to repair faults.
- guard regions may use guard regions to detect potentially unsafe memory accesses.
- the subject application program may be modified in embodiments (1) to intersperse guard region with the application program's data, (2) to update the embodiment's data about where the guard regions are located, and (3) to check that potentially unsafe instructions do not access a guard region in a disallowed manner. Interspersing guard regions as in (1) and updating the subject application program's data as in (2) involve modifications to the steps the application program takes to allocate and deallocate memory. Checking potentially unsafe instructions as in (3) involves modifications to instructions used to access memory.
- performing the modifications for (3) reasonably can be expected to incur a substantially higher runtime overhead than (1) and (2) in example implementations, as memory accesses may be expected to occur orders of magnitude more often than memory allocation and deallocation.
- the techniques that are selected for implementing (l)-(3) may depend on factors such as, for example, the performance characteristics of each subject execution platform, the context of individual instructions in the application program to be instrumented, and/or the like.
- example embodiments may use a series of nested tests to check if the application program should be allowed to access the values at a given address. The earlier tests of the series of nested tests are designed to be cheap when compared to later tests.
- the early tests i.e., tests occurring earlier in the nested tests
- some embodiments may maintain only a partial map of guard regions or no map at all, they may use a branch-free technique for the early tests, they may use different tests for different instructions in the same protected application, they may use different types of guard regions to detect different types of memory errors, and they may implement a recovery plan to provide safe, continued execution when an error is detected.
- Guard regions are filled with predetermined guard values.
- a check (or as described below, multiple checks) that may be performed by certain embodiments to determine if an address A is safe, is to check if the value stored at memory location A is a guard value (e.g., a predetermined guard value written to that guard region by the
- A is assumed to not be in a guard region, and is assumed to be safe; if the value at A is a guard value, A may be determined to be in a guard region and therefore unsafe. In some embodiments, further checking may be performed to determine whether or not A is unsafe when the value at A is a guard value.
- Example embodiments may perform the check for the guard value, perform subsequent checks, and select guard values, in accordance with the procedures described below. It will be appreciated that there are multiple techniques that can be used for some of these steps and, in certain example embodiments, multiple strategies may be used in any suitable combination, sub-combination, or combination of sub-combinations, e.g., to protect a single binary, e.g., as is made more clear below.
- FIG. 4 illustrates example pseudo code 400 describing a technique that may be used in certain example embodiments to check for a guard value at memory location A when a subject application program includes an instruction instr that accesses n bytes at address A.
- the technique shown in FIG. 4 has the advantage of being relatively simple (e.g., relatively easy to implement) and relatively cheap (e.g., relatively low processing and/or time overhead). Depending on the machine architecture, in some platforms, it may incur overhead for introducing additional memory accesses (to save and restore program state) and an additional conditional-branch instruction.
- Certain example embodiments may opt to use a branchless implementation of some check(s) for guard values at an address A.
- the idea is to read the value v stored at .4 and perform a calculation that would cause a hardware exception if v is a guard value.
- an embodiment may perform a bitwise exclusive-or of R with the guard value so that R will hold zero if and only if it original held the guard value. The embodiment may then use R in an address computation and memory access that will access protected memory if and only if R is zero.
- certain example embodiments may initialize some static data as shown in FIG. 5. Thereafter, to perform the desired check (e.g., to determine "does A contain a guard-value byte?"), the example embodiments may insert example instrumentation such as that shown in FIG. 6 in the subject application program.
- instrumentation similar to that shown in FIGs. 5-6 may require saving and restoring less state. If certain example embodiments can identify a free register at the location where it wants to insert the check, it is possible that no state will need to be saved or restored. A mix of different checking strategies may be used for different instructions in the subject program.
- a customized instruction sequence may be used to check if the instruction is safe.
- certain embodiments may use a chain of compare-and-branch instructions; for others, embodiments may use one of the hardware-exception mechanisms described in the previous section.
- Instructions may be identified as dangerous based upon a predetermined list of potentially dangerous instruction types, predetermined parameters or ranges of parameters values identified as potentially dangerous, and/or based on other techniques.
- Some example embodiments may use dynamic instrumentation to insert the checks and may also change the checking instrumentation based on online profiling information.
- certain example embodiments may perform an initial check for a guard value that may be followed by a more thorough check.
- the initial check is quick (e.g., low overhead in processing/time) but may not be accurate.
- the initial check may be for a 1-byte (8 bit) small- guard value
- the subsequent more expensive check may be for a full 8-byte (64 bit) full- guard value.
- the system may first check if the byte at address A holds the small guard value. If it does, the system can then check if the 8-byte aligned word containing A holds the bipartite guard value. If it does, either it is assumed that A is in a guard region, or one or more expensive checks may be performed.
- the small guard value may be selected randomly, but preferably excluding the most common 8-bit values, such as 0 and -1.
- the small guard value may be placed in the bipartite guard value at offsets that might be addressed by aligned, strided accesses on the target machine. For example, on a little-endian, byte-addressable machine, this would be byte offsets 0, 4, 6, and 7 (See FIG. 8).
- the full (e.g., bipartite) guard is constructed at the beginning of program execution, as shown (assuming a little-endian machine) in the pseudo code of FIG. 7, for example.
- the bipartite guard value may be placed in all guard regions when they are created and removed before the region is reused. In some embodiments, the bytes of the bipartite guard that do not hold the small-guard value hold bytes selected uniformly at random.
- FIG. 8 shows the layout of a bipartite guard 800 on a little-endian machine, according to certain example embodiments. This layout is motivated by the observations that compilers usually try to align data on word boundaries, and that loops that overrun or underrun a buffer are usually accessing the buffer in a power-of-two stride (e.g., 1-byte, 2- bytes, 4-bytes, or 8-bytes on an 8-byte machine).
- Location 802 in the bipartite guard includes a small guard value, and location 804 includes a randomly selected byte value. As shown in FIG.
- the layout 900 of the bipartite guard ensures that aligned, strided buffer accesses will land on a small-guard value in the bipartite guard.
- Byte 902 represents the byte 802 in the bipartite guard 800.
- Other small guard values are at offsets 4, 6 and 7.
- Randomly selected byte values are at offsets 1, 2, 3 and 5.
- the randomly selected bytes of the bipartite guard (e.g., at offsets 1, 2, 3, and 5) make it hard to guess the value of the full guard and vanishingly unlikely that the full guard value may arise by chance during the execution of the subject application program.
- the table rows labeled 1, 2, 4 and 8 in layout 900 represent strided accesses at 1 byte, 2 bytes, 4 bytes and 8 bytes, respectively.
- bytes of the bipartite guard accessed during strided accesses of the various offsets are shown with a marking (a star marking) within table cells corresponding to a particular byte of the bipartite guard that is accessed in each type of strided access. For example, when the stride is at 8-bytes only the first byte (i.e. 0 th byte, byte identified as 902) of the bipartite guard is accessed, regardless of whether the iteration order is forward or backwards through memory (see the row identified as 8 in FIG. 9).
- guard maps may provide even stronger protections against memory corruption by, for example, protecting against misaligned accesses by an attacker.
- Guard maps are one or more maps maintained by certain
- the maps are updated every time memory is allocated or deallocated.
- the guard value may include repeated copies of a randomly selected 1-byte value.
- the initial check may always check for M-copies of the guard value (e.g., small-guard value), where n is the number of bytes that are accessed in the instruction that is being checked. The more expensive check consults the maps for the presence of the untrusted address: if it is in a guard region, then the attempted access is unsafe.
- Certain example embodiments may use a trie or other suitable data structure to implement a single guard map for the entire application program. However, in more secure embodiments, embodiments may use more than one guard map, or different types of guard maps for different memory regions.
- FIG. 10 illustrates an example guard map.
- example embodiments may use a direct map cache, e.g., that contains a single bit for each byte in the stack.
- Embodiments may use direct mapping between the region of the stack memory that is being mapped and the map. Each byte of memory in the stack can be represented by a single bit in the map.
- functions in the subject application program may have a fixed layout for the function's local, temporary data that is stored on the stack.
- An embodiment may create a template map for each activation record. When a function is invoked and space for its temporaries is allocated on the stack, the embodiment can copy the function's associated map template directly onto the map.
- a direct-map cache in certain embodiments, is similar to a one-level trie.
- An advantage of using the direct-map cache is improved speed of update and access.
- Embodiments may leverage the fact that every time an activation record for procedure foo is created on the stack, it may use exactly the same data layout, and hence, the guard regions may be exactly the same. This means that example embodiments can prepare a template that contains the appropriate bit pattern representing the locations of the guard regions in foo's activation record and simply copy it to the end of the map for the currently running thread. Similarly, a template can be used for initializing the guard values in the activation record.
- Certain example embodiments may be such that their implementation of the heap-manager may already maintain the requisite information, so that no additional overhead or data structure is necessary.
- the heap manager may already map all of the blocks in the heap, and leverage the existing heap map to infer the location of guards in the heap.
- statically-allocated memory such as, for example, the program's "global data”
- certain example embodiments may use a hash table or similar data structure to store the locations of the guard regions, which do not change during the program's execution.
- Some embodiments may use standard data structures for representing sets (e.g., hash tables) to store the fixed set of guard regions.
- implementing the more expensive check for guard values includes separately checking each map.
- the multiple maps may be checked sequentially, and in other embodiments two or more of the maps may be checked in parallel.
- guard maps A potential danger in using guard maps is that an attacker may be able to force an errant-memory update that corrupts the map, thereby allowing more latitude in forcing other unsafe memory accesses.
- the inventors have observed that with a particular implementation of a guard map (e.g., using a direct-map cache), the majority of locations in a guard map may contain the value zero. Accordingly, certain example embodiments store the bytes of the guard map after exclusive-or'ing them with the small-guard value, so that the majority of bytes in the guard map are the small-guard value. Furthermore, certain example embodiments mark the entire guard map as a guard(ed) region.
- guard regions are regions of memory selectively identified by embodiments as areas that the application program has no valid reason to access. In this manner, example embodiments may use their checks on potential errant-memory updates to protect the integrity of its own guard maps. Similar techniques may be used to guard one or more types of other critical data.
- Certain example embodiments may use different guard implementations for different regions of memory.
- a technique for efficiently implementing and checking for guard regions may be based on hybrid guard values.
- One attractive solution may be to protect stack memory with bipartite guards (thereby potentially obviating the need for guard-map updates when allocating/deallocating stack frames), and use homogenous guards to guard heap memory (where the guard map may be provided by the native heap manager).
- the instrumentation for checking whether address A is safe can be implemented using the pseudo-code shown in FIG. 11.
- the configuration shown in FIG. 1 1 can be extended in such a way that both types of guards are used in the heap: when the application program requests a heap block with N bytes, certain example embodiments may increase Nto allow space for (one) guard value and then round up to the next power of two; it actually reserves M > N bytes. Certain example embodiments place a homogenous guard at the end of the M reserved bytes.
- the heap manager in some example embodiments provides a capability to look up an arbitrary address and determine if it is in an allocated block, and if so, the location and size of the block. Using this capability certain example embodiments implement a guard map for the homogenous guards placed at the end of blocks: if an address is at the end of the block, it is in the guard region.
- the malloc implementation in at least some embodiments need not necessarily record the original requested size, N, anywhere. Consequently, overruns that exceed Nbut still do not hit the guard at the end of the M-byte block may not be detected.
- some embodiments may place a bipartite guard after the Nth byte of the allocated block and prior to the homogenous guard at the end of the block. As described above, this provides the full strength of the homogenous guard (which provides better protection against misaligned accesses) for the end of the allocated block, while still providing some protection for overruns that surpass the Nth byte in the middle of the buffer.
- M may be greater than or equal to 2 *N.
- certain embodiments may place a homogenous guard at the (M/2)th byte, which is still easily located using the heap-management data structures.
- the presence or absence of a second, middle-of-buffer guard can be indicated with a single bit, which is much less than the amount of space needed to store N.
- any access to a guard region may be disallowed to a subject application program.
- Different guard classes are given different semantic interpretations, e.g., as to what types of memory accesses (read or write) should be allowed for guard of a given class.
- the guard classes used by certain example embodiments may include, but are not limited to: read/write guards, read guard, page guard, unallocated memory guards, and cloneable read guards.
- Embodiments differ from conventional approaches by unifying the detection of different types of memory errors around the concept of guards and using different types of guards to detect different types of memory errors.
- Read/write guards are configured so that any attempted read or write access indicates an error or attempted exploit of the subject program. Some form of read/write guards were introduced in K. Serebryany, D. Bruening, A. Potapenko, and D. Vyukov, "Address Sanitizer: A Fast Address Sanity Checker,” in USENIX Annual Technical
- Read guards are configured so that any attempted read access indicates an error or attempted exploit, but write accesses are allowed and cause embodiments to remove the guard. Read guards may be useful for detecting when the program attempts to read memory it has not yet initialized. An embodiment may, for example, insert read guards in newly allocated memory and memory that holds stale data; check potentially dangerous read accesses to ensure they are not accessing a read guard; and remove corresponding read guards when a write access to a read guard is detected.
- Page guards are configured so that attempted read or write access of any byte on the page containing the guard indicates an error or attempted exploit.
- Embodiments may place page guards on code pages and use them to detect attempts to scan code pages, e.g., for return-oriented programming (ROP) gadgets.
- ROP is described in A. Bittau, A. Belay, A. Mashtizadeh, D. Mazieres, and D. Boneh, "Hacking blind,” in Proceedings of the 35th IEEE Symposium on Security and Privacy, 2014.
- Unallocated memory guards are configured such that any attempted read or write access indicates an error or attempted exploit of the subject program.
- Example embodiments place unallocated memory guards in memory (e.g., heap memory) that the program was previously using but subsequently returned to the heap manager.
- An access of an unallocated-mem guard indicates a use-after- free error, which the embodiments may attempt to repair.
- Cloneable read guards are configured to disallow read accesses, except for the purpose of cloning the protected memory region. Cloneable read guards may be valuable for avoiding or reducing false positives in the presence of certain types of initialization patterns.
- guards described above in one or more embodiments may be modified as follows to support different "guard classes.” Small guard values can be the same for all guard classes. There may be different bipartite guards for each guard class, indicated by a few bits in one of the random bytes of the guard class. Guard maps are extended to indicate the class of each mapped guard. Guard checks are extended to consider the guard class. For example, the initial, cheap check can be the same for all checked memory accesses. The secondary check may differ depending on the type of access. For example, a read access may fail if any type of guard is found, and a write access may fail if any class of guard except a read guard is found.
- a read guard When a read guard is found upon a write, the read guards may be removed, and the check may be indicated having passed.
- a bulk access i.e., a library call that reads or writes to a range of memory
- the response provided when a check fails can also depend on the class of guard that caused the check to fail. For example, upon an attempted access of an unalloc-mem guard, an embodiment may attempt to restore the memory block, mark the block as allocated, and continue execution.
- guards may be placed in different situations. If embodiments uses read/write guards to delineate program data, such guards may be placed at the end of heap blocks. Read guards may be placed in some or all of newly allocated heap or stack memory, and/or in memory that could have been written or overwritten by a library call, but was not. For example, a call read (fd, bu M) may read up to Mbytes from fd into buf If n ⁇ M bytes are actually read, then embodiments may place read guards in the (n-M) bytes of buf after the portion that was accessed by the call to read.
- Certain example embodiments may optionally place page guards on pages holding code or other sensitive metadata, such as guard maps or heap maps. Hooking code, e.g., library calls that scan memory and checking that the scan may not access any page guards, can be used to detect unwarranted page scans. Moreover, certain example embodiments may optionally place unallocated-memory guards on heap blocks before they are placed into a free quarantine or they are returned to the heap manager.
- Hooking code e.g., library calls that scan memory and checking that the scan may not access any page guards, can be used to detect unwarranted page scans.
- certain example embodiments may optionally place unallocated-memory guards on heap blocks before they are placed into a free quarantine or they are returned to the heap manager.
- the layout of its data in memory may change because memory regions are constantly allocated and released (deallocated). Memory that has been deallocated may subsequently be reused to fulfill a new memory-allocation need.
- an embodiment operates to learn the program's intended data layouts and modifies the layouts to allow room for guard regions.
- embodiments help ensure that the guards are properly maintained (e.g., in accordance with the modified layouts) as memory is allocated and deallocated.
- different mechanisms may be utilized for stack memory, heap memory, and static memory.
- the subject application program may have multiple threads, each with a runtime stack that is typically used to store temporary data, such as the arguments and variables for a function invocation.
- a function call to a function foo a new region is allocated on the "top" of calling thread's stack, referred to herein as the activation record for foo.
- the activation record for foo When foo 's execution completes, its activation record is (implicitly) deallocated; the memory may be reused on subsequent function calls.
- embodiments are configured to ensure (a) that there are guard regions delineating the data objects on the "live" portions of the runtime stacks, and (b) that it can reliably determine where these guard regions are.
- any used memory on the stack would be tracked as belonging to one or more guard region(s).
- One technique is to update the guards and guard maps on every allocation and deallocation of an activation record.
- On a function call to a function foo (causing the creation of an activation record), example embodiments modify the initialization of/oo's activation record to initialize the desired guard regions in the activation record with guard values. It may also update the guard maps with the locations of the new guard regions.
- foo's activation record is deallocated (either by a normal return or a non-local control transfer, such as an exception), the guard values are cleared, and the guard maps are updated to indicate those guard regions have been removed.
- the above strategy may have the lowest possible runtime overhead. In other cases, it may be inefficient, and it may be overly conservative.
- the above strategy assumes that when an activation record is deallocated, none of the memory is protected (in a guard region). In order to ensure that the system is protected, it may be desirable to protect all of that memory.
- One option is to fill the entire deallocated region with guard values and update the guard map (if any) appropriately. If the granularity of the guard map is chosen to match the activation record alignment, the update may be made considerably more efficient. Another option is to simply leave the guard values and guard map alone (e.g., to not change) during deallocation.
- example embodiments may increase the size of the requested allocations to allow room for a guard value, and place a guard at the end of the allocated block. The embodiments may also optionally clear the other bytes in the heap block to ensure that no stale data is leaked. Other aspects of the example embodiments' mechanism for maintaining guards in heap memory may depend on the heap-management library that is ultimately used.
- Example embodiments may use many different techniques to reduce the likelihood of exploits of use-after- free vulnerabilities. Some embodiments, for example, may queue the program's requests for deallocation of blocks, thereby temporarily prolonging the "lifetime" of the block allocation before it is reclaimed for reuse. This technique protects against use-after-free vulnerabilities because an exploit cannot succeed until the block is reallocated.
- Some embodiments may randomize the order in which deallocation requests are processed from the free list. This technique protects by making it difficult to predict the circumstances under which a block may be reallocated, which is an operational principle behind many successful exploits.
- Some embodiments may protect against use-after-free vulnerabilities by, at some point before a block is re-allocated (e.g., before it officially deallocates the block by marking it available for allocation), storing a copy of some bytes of the block into the extra padding at the end of the block and/or overwrite some or all of the block with unalloc-mem guard values.
- One technique is to only place an unalloc-mem guard at the beginning of the heap block, although some implementations for checking for guards may not always catch accesses past the first word of the block. Some compensation for this may be based on the observation that frequently it is possible to infer the beginning of a block for a memory access that may access the middle of the block.
- base + offset For example, given a memory address (e.g., base + offset), often base may point to the beginning of the block, while (base + offset) may be in the middle of the block.
- some embodiments may check base for an unalloc-mem guard. If the guard values are accessed before the block is reallocated, (i) it indicates a use-after-free vulnerability and (ii) it may be detected. At that point, the embodiments may execute any of several repair strategies. [00102]
- the heap-management implementation of certain example embodiments may allocate from the set of free blocks at random. As with some of the above described defenses, this makes it difficult to predict when the block may be reallocated, and it prolongs the time before the block is reallocated. Only when the block has finally been reallocated does a use- after- free exploit become possible.
- the subject application program's static memory includes global variables and file-scope and function-scope static variables that have a fixed location potentially for the lifetime of the program.
- Each dynamic library used by the subject application program may have its own static data segment, which has a fixed layout while the library remains loaded.
- an example embodiment may modify the layout of static data to insert guard regions.
- the example embodiment may use a hash table (or other suitable data structure) to track the locations of guard regions in the
- the example embodiment may initialize the guard regions in the static memory with guard values and update the guard map for static memory.
- the guard map for static memory is adjusted appropriately.
- the program allocates a block of memory; the program fills the block with sensitive information, e.g., a password; the program releases the block (without clearing its contents); the program reallocates the block for a new purpose; and subsequently, under the control of an attacker, the program reads and reports the contents of the block before overwriting some or all of the contents (i.e., the program reads contents that are "uninitialized” since the reallocation.
- the program reads and reports the contents of the block before overwriting some or all of the contents (i.e., the program reads contents that are "uninitialized” since the reallocation.
- Example embodiments use many heuristics to detect when memory is being reused and there may be a risk of leaking the old contents of the memory.
- the embodiments may be configured to use combinations of analyses and heuristics to determine when a buffer is being partially or completely reused.
- Some embodiments may use explicit allocation to determine when a buffer is being partially or completely reused.
- explicit allocation technique when an embodiment detects memory being (re)allocated via a call to mallocQ or the creation of a new procedure frame, it may assume the new memory is being reused and should be considered "uninitialized.”
- Some embodiments use inferred recycling functions to determine when a buffer is being at least partially reused.
- a function might return uninitialized heap memory (obtained via a call to malloc) or some other heap block, then certain embodiments may assume the function is implements heap-block recycling.
- a function that implements heap-block recycling arranges for reuse of heap blocks without returning them to the heap manager.
- Embodiments may rely on their respective implementation of malloc to dynamically check if a value returned by a potential recycling function is the beginning of a heap block.
- Some example embodiments use a technique referred to as "fill gaps" in order to detect at least partial reuse of the freed memory block before re- initialization.
- Many library procedures may fill a variable amount of a buffer, up to some maximum number of bytes, M.
- M the number of bytes
- the fill gap may assume that fill gaps should be considered to be uninitialized.
- Some example embodiments use a technique referred to herein as "file- descriptor taint" in order to detect at least partial use of freed memory blocks.
- an example embodiment hooks calls to read(), memcpyQ, and/or other memory-copying functions.
- the example embodiment may use space at the end of each heap block to record some file-descriptor taint about each heap block.
- the application program reads input into a buffer and overwrites pre-existing data with tainted data from a different file descriptor, the example embodiment may conclude that the block is being reused, and that the old data can be cleared. This may happen during a call to readQ or to memcpyQ or some later functions.
- Another technique used by some embodiments for recognizing that a heap block is being reused includes detecting when the following conditions hold: (1) the heap block is returned from a function that sometimes returns uninitialized memory acquired directly from malloc; and (2) the heap block is returned from a function that appears to take few external arguments, e.g., only a size argument. In these situations, it may be reasonable to assume that the function is "recycling" a heap block. In some embodiments, the heap block can be cleared before being returned. Yet another technique used in some
- embodiments for recognizing that a heap block is being reused includes recognizing when the heap block contains data originally read from an external source and that data is being overwritten with different data from an external source. In these cases, it may be reasonable to assume that the block is being used as a "read buffer” and clear the entire contents of the buffer, or at least the maximum extent of the buffer occupied by previously read or to-be- occupied by newly read data.
- an example embodiment determines that memory is being reused—e.g., that the current contents are stale and the memory should be overwritten before it is reused— it may use a combination of the following strategies: (1) clear the memory; (2) place a read guard in the memory and modify unsafe read instructions to first check for the read guard.
- Another technique used in some embodiments for identifying memory regions that hold stale data intercepts code (e.g., library calls, inlined procedures, or loops) that may write a variable amount of memory up to a specified maximum. Any memory between the end of what is actually written and the specified maximum is considered to hold "stale" data that the subject program no longer needs.
- code e.g., library calls, inlined procedures, or loops
- an example embodiment When an example embodiment detects a vulnerability, it may use one or more of several repair techniques to remove the vulnerability or to reduce the risk posed by the vulnerability. In some cases, the embodiment may perform the repair such that the application program can continue execution.
- an example embodiment may detect an attempted overrun of a heap-allocated buffer. In these situations, there are several steps the embodiment may take to attempt to "grow" the buffer, essentially by performing a reallocation ("realloc()") on the buffer. The reallocation may differ based on whether or not the neighboring heap block is allocated. If the block is not allocated, the embodiment may mark the block as allocated, and allow the "overrun" to proceed into the neighboring block. Effectively, the heap block is increased in size.
- the embodiment may take the following steps: allocating a larger block at some other location in memory; copy all of the data in the original heap block to the new heap block; overwriting all of the data in the original heap block with a homogeneous guard value; and redirecting all future attempts to access the original block to instead access the new block.
- the overwriting of all of the data in the original heap block ensures that any attempted access to the original heap block may be detected.
- Some embodiments may be configured to replace over-reads with
- an example embodiment when an example embodiment detects an attempt to read past the end of a buffer, instead of performing the read (and potentially releasing sensitive information), it may replace the results of the read with manufactured data and allow the program to continue execution. For example, the embodiment may return common sentinel values, such as 0 and -1, or random data.
- Some embodiments may be configured for early loop termination for overwrites. For example, when an embodiment detects an attempt to write past the end of a buffer, instead of performing the write, it may be configured to terminate the loop that is attempting the write.
- a technique used in some embodiments for automatically recovering from overruns of heap blocks when the adjacent heap block is not currently allocated includes: automatically detecting when the overrun occurs by detecting an attempted access of the guard region at the end of the heap block; automatically marking the adjacent heap block as allocated; and/or allowing the overrunning code to continue into the adjacent block.
- Another technique used in some embodiments for automatically recovering from overruns of heap blocks may include: automatically detecting when the overrun occurs by detecting an attempted access of the guard region at the end of the heap block; allocating a new, larger block somewhere else in the heap; copying the data from the original block to the new block; converting the original block into a guard region so that future attempts to access the original block may be detected as attempted accesses to a guard region; and when future accesses to the original block are detected, redirecting the attempted access to instead access the new block.
- the corresponding address of the new block can be updated.
- the corresponding values from the new block can be returned.
- loops and/or library calls that access a range of addresses beginning in the original block and continuing beyond its (original) end may be identified, and the accesses may be redirected to the new block.
- certain example embodiments may run in connection with a standalone or networked computer and/or computer system comprising a plurality of computer nodes.
- an instance of a process for hardening application programs according to an embodiment may run in memory.
- Components may include, for example, memory, at least one processor, a data store, an OS kernel, etc. It will be appreciated that such an environment may be used in connection with, or be simply backed by an embodiment as shown in FIG. 3. It also will be appreciated that certain example embodiments may work in any design time and/or runtime environment including, for example, Windows, Linux, Unix, MacOS, and/or other operating systems present on the example electronic devices mentioned above.
- the techniques described herein may be used in any suitable combination, sub-combination, or combination of sub-combinations, e.g., as appropriate to the programming language, runtime environment, etc.
- certain example embodiments may be made to work with programming languages including, for example, C, C++, Assembler, Java, etc.
- the programming language may be a compiled or interpreted language, and may run on a physical or virtual machine.
- system, subsystem, service, programmed logic circuitry, and the like may be implemented as any suitable combination of software, hardware, firmware, and/or the like.
- storage locations herein may be any suitable combination of disk drive devices, memory locations, solid state drives, CD-ROMs, DVDs, tape backups, storage area network (SAN) systems, and/or any other appropriate tangible computer readable storage medium.
- processor e.g., central processing unit (CPU) or specialized processor
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Storage Device Security (AREA)
Abstract
Certain example embodiments described herein relate to techniques for automatically protecting, or hardening, software against exploits of memory-corruption vulnerabilities. The techniques include arranging a plurality of guard regions in the memory in relation to data objects formed by the application program, identifying an access by the application program to a guard region arranged in the memory as a disallowed access, and modifying the execution of the application program in response to the identifying, the modifying being in order to prevent exploitation of the memory and/or to correctly execute the application program.
Description
TITLE OF THE INVENTION
SYSTEMS AND/OR METHODS FOR AUTOMATICALLY PROTECTING AGAINST
MEMORY CORRUPTION VULNERABILITIES
INVENTORS: DAVID GORDON MELSKI,
NATHAN TAYLOR KENNEDY, AND
DREW CHRISTIAN DEHAAS
CROSS-REFERENCE TO RELATED APPLICATIONS
[0001] This application claims the benefit of U.S. Provisional Patent Application No.
62/028,004 filed on July 23, 2014, the entire contents of which is hereby incorporated herein by reference.
TECHNICAL FIELD
[0002] Certain example embodiments described herein relate to techniques for computer software processing. More particularly, certain example embodiments relate to techniques for automatically protecting, or hardening, software against exploits of memory- corruption vulnerabilities.
BACKGROUND AND SUMMARY OF EXAMPLE EMBODIMENTS OF THE
INVENTION
[0003] Software applications may contain flawed logic, or faults. A carefully crafted malicious input and/or program may exploit the faults in a software application in a manner that causes the application to deviate from its intended behavior. Such deviation may have potentially dangerous consequences for the application's user and/or the system on which the application is running. Such faults are often referred to as "software vulnerabilities" or simply "vulnerabilities". Memory-corruption vulnerabilities are important class of software vulnerabilities that lead to corruption of an application's in-memory data. A taxonomy of software vulnerabilities known as the Common Weakness Enumeration (CWE Version 2.8, "CWE - Common Weakness Enumeration," MITRE 2014-7-31) provides a categorization of some possible vulnerabilities.
[0004] Although numerous techniques are available for detecting and handling software vulnerabilities, many conventional techniques do not provide an efficient and robust
system capable of detecting and handling the wide range of possible software vulnerabilities. Embodiments of the present invention provide a robust and efficient technique for automatically protecting, or hardening, software against exploitation of memory-corruption vulnerabilities.
[0005] An example embodiment provides computing system comprising at least one memory and at least one processor configured to execute a security-enhanced application program. The program includes arranging a plurality of guard regions in the memory in relation to data objects formed by the application program, identifying an access by the application program to a guard region arranged in the memory as a disallowed access, and modifying the execution of the application program in response to the identifying. The modifying may be in order to prevent exploitation of the memory and/or to correctly execute the application program.
[0006] The identifying an access in example embodiments may include at least one of
(A) tracking memory object creation and deletion, and (B) detecting whether a memory access by the application program is a disallowed access to a guard region.
[0007] The program may further include placing bipartite guards in the guard regions arranged in memory, the bipartite guards each having a predetermined number of bits. The detecting whether a memory access is a disallowed access comprises may include determining an address associated with the memory access, and determining whether at least one of the bipartite guards placed in the guard regions is located at the determined address.
[0008] Placing bipartite guards may in example embodiments include placing a predetermined small guard value in one of the bipartite guards at one or more predetermined offsets. Determining whether at least one of the bipartite guards are located at the determined address may include checking whether the predetermined small guard value is positioned at the determined address.
[0009] Placing the bipartite guards may in example embodiments further include arranging uniformly randomly selected bytes in parts of the bipartite guards where no predetermined small guard value is placed. Determining whether at least one of the bipartite guards are located at the address may include, if the predetermined small guard value is positioned at the address, determining if a multi-byte aligned word containing the determined address holds a full guard value.
[0010] The predetermined small guard value may in example embodiments be one byte in size. The bipartite guard may be placed in all guard regions when they are created and is removed before the region is reused.
[0011] Determining whether at least one of the bipartite guards are located at the address may in example embodiments further include arranging a computation that may cause a runtime exception if and only if the full guard value is present.
[0012] An example embodiment may in example embodiments further include performing an exclusive-or operation of data in a guard map with a guard value in order to populate a substantially larger portion of the guard map with the guard value.
[0013] In some example embodiments, the tracking may include at least one of (A) for a portion of the memory that is a stack memory, directly mapping between a region of the stack memory that is being mapped and the map, (B) for a portion of the memory that is a heap memory, using a heap map to infer locations of the guards in the heap, and (C) for a portion of the memory that is a static memory, using standard data structures for representing sets to store a fixed set of said guard regions.
[0014] In some example embodiments, the tracking may include detecting a reuse of a block in a heap portion of the memory based upon whether (1) the block is returned from a function that sometimes returns uninitialized memory acquired directly from a memory allocation, and/or (2) the block is returned from a function having fewer than a predetermined number of external arguments.
[0015] In some example embodiments, the tracking may include detecting a reuse of a block in a heap portion of the memory based upon whether (1) the block contains data originally read from an external source, and (2) the data is overwritten with different data from an external source.
[0016] In some example embodiments, the tracking may include protecting a first set of areas of the memory using said bipartite guards and without guard maps, and protecting a second set of areas of the memory using homogenous guard values and guard maps.
[0017] In some example embodiments, the tracking may include, when a data object is freed by the application program, marking a region of the memory used by the data object as a guard region, and wherein the marking includes overwriting the region with guard values.
[0018] In some example embodiments, freed memory regions are marked with a dedicated unalloc-mem guard value distinct from other classes of guard values and detecting a use-after-free error comprises checking for the unalloc-mem guard value.
[0019] In some example embodiments, the tracking may include, when a data object is freed by the application program, before said overwriting, saving current contents of the region; and if a subsequent use of the region is detected, restoring the region using the saved contents.
[0020] In some example embodiments, wherein determining if an access to a memory location computed as (base + offset) is a disallowed access further includes checking if base is in a guard region.
[0021] In some example embodiments, wherein determining if an access to a memory location computed as (base + offset) is a disallowed access further comprises checking if base and (base + offset) are in the same heap block.
[0022] In some example embodiments, wherein modifying the execution of the application program includes: automatically determining when a memory overrun occurs by detecting an attempted access of the guard region at the end of a block in a heap portion of the memory; automatically marking another block adjacent to the block as allocated; and/or providing for overrunning code to continue into the marked block.
[0023] In some embodiments, modifying the execution of the application program may include automatically determining when a memory overrun occurs by detecting an attempted access one of the guard regions at the end of a first block in a heap portion of the memory, allocating a second block in the heap portion, wherein the second block is larger than the first block, copying data from the first block to the second block, converting the first block into a guard region such that subsequent accesses to the first block are detected as attempted accesses to one of said guard regions, and when a subsequent access to the first block is detected, redirecting the access to instead access the second block.
[0024] Some embodiments may further include inserting read guards in newly allocated memory and/or memory that holds stale data, checking read accesses to determine whether an inserted read guard is accessed, thereby detecting runtime uses of uninitialized memory and/or potential information leaks, and removing an inserted read guard when a write access to the inserted read guard is detected.
[0025] Some embodiments may further include intercepting library calls writing a variable amount of said memory up to a specified maximum, and identifying portions of the memory between the end of said variable amount written and the specified maximum as stale data that the subject program no longer uses.
[0026] Some embodiments may further include at least one of (A) detecting an attempted scan of the memory by placing page guards on selected pages, or (B) detecting an attempted scan of the memory by inserting hooks in selected portions of code to check for the page guards.
[0027] An example embodiment provides a method for executing a security-enhanced application program on a computing system comprising at least one memory and at least one processor. The method includes: arranging a plurality of guard regions in the memory in relation to data objects formed by the application program, automatically identifying an access by the application program to a guard region arranged in the memory as a disallowed access, and automatically modifying the execution of the application program in response to the identifying. The modifying being in order to prevent exploitation of the memory and/or to correctly execute the application program.
[0028] An example embodiment provides a non-transitory computer readable storage medium storing a security-enhanced application program which, when executed by a processor of a computing system including a memory, causes the computing system to perform operations comprising: arranging a plurality of guard regions in the memory in relation to data objects formed by the application program, automatically identifying an access by the application program to a guard region arranged in the memory as a disallowed access, and automatically modifying the execution of the application program in response to the identifying. The modifying may be in order to prevent exploitation of the memory and/or to correctly execute the application program.
[0029] These aspects, features, and example embodiments may be used separately and/or applied in various combinations to achieve yet further embodiments of this invention.
BRIEF DESCRIPTION OF THE DRAWINGS
[0030] These and other features and advantages may be better and more completely understood by reference to the following detailed description of exemplary illustrative embodiments in conjunction with the drawings, of which:
[0031] FIG. 1 is a flow chart illustrating the overall process for automatically protecting, or hardening, software against exploits of memory-corruption vulnerabilities, according to one or more embodiments;
[0032] FIG. 2 illustrates an interaction chart illustrating aspects of the preparation stage processing, according to some embodiments;
[0033] FIG. 3 illustrates an interaction chart illustrating aspects of the runtime monitoring stage, according to some embodiments;
[0034] FIG. 4 illustrates example pseudo code for checking for a guard value at memory a location, in accordance with some embodiments;
[0035] FIG. 5 illustrates example pseudo code for initializing data, in accordance with some embodiments;
[0036] FIG. 6 illustrates example pseudo code for checking whether a memory location contains a guard value, in accordance with some embodiments;
[0037] FIG. 7 illustrates example pseudo code including constructing a guard, in accordance with some embodiments;
[0038] FIG. 8 illustrates an example layout of a bipartite guard, according to some embodiments;
[0039] FIG. 9 illustrates an example layout of a bipartite guard, according to some embodiments;
[0040] FIG. 10 illustrates a guard map according to some embodiments; and
[0041] FIG. 1 1 illustrates pseudo code for an example technique for checking whether an address is safe, according to some embodiments.
DETAILED DESCRIPTION OF EXAMPLE EMBODIMENTS OF THE INVENTION
[0042] According to some embodiments of the present invention, a system for automatically protecting, or hardening, software against exploits of memory-corruption vulnerabilities is provided. Vulnerabilities that are guarded against by example embodiments may include one or more of: CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow'), CWE-121 Stack-based Buffer Overflow, CWE-122 Heap-based Buffer Overflow, CWE-124 Buffer Underwrite ('Buffer Underflow'), CWE-126 Buffer Over-read, CWE-127 Buffer Under-read, CWE-129 Improper Validation of Array Index, CWE-134 Uncontrolled Format String, CWE-170 Improper Null Termination, CWE-415 Double Free, CWE-416 Use After Free, CWE-457 Use of Uninitialized Variable, CWE-590 Free of Memory not on the Heap, CWE-665 Improper Initialization, CWE-761 Free of Pointer not at Start of Buffer, CWE-762 Mismatched Memory Management Routines, CWE-805 Buffer
Access with Incorrect Length Value, CWE-806 Buffer Access Using Size of Source Buffer, CWE-824 Access of Uninitialized Pointer, and CWE-908 Use of Uninitialized Resource.
[0043] Certain example embodiments protect software that run on general purpose electronic computing hardware, including personal computers, servers, and embedded devices such as, but not limited to, smart phones or gaming consoles. Software applications protected by example embodiments include, but are not limited to, software that manually manage memory resources, for example, by using a combination of a system library procedure, such as malloc, and a runtime stack that is typically maintained by updating one or more dedicated hardware registers.
[0044] Embodiments described herein may use any combination of one or more disclosed techniques for automatically protecting, or hardening, software against exploits of memory-corruption vulnerabilities. These techniques include, for example: modifying the application program to change the way it arranges its data, specifically to insert "guard regions" between the application program's data objects; tracking the guard regions as they are created and destroyed (corresponding to the allocation and release of memory regions by the subject program as it executes); checking potentially dangerous memory accesses by the subject program to ensure they are not accessing guard regions in a disallowed manner; tracking additional information about the usage of memory regions to identify when memory is about to be reused and the old contents can be cleared; and/or modifying the program execution when a dangerous access (i.e., access to an area with a guard value) is detected so that the state of the subject application program is not compromised (i.e., exploited), and the application program continues to execute correctly.
[0045] FIG. 1 illustrates a flowchart 100 of a process for protecting software in accordance with example embodiments. As shown in flowchart 100, the process 100 protecting of software against vulnerabilities operates in two stages: a preparation stage 102 and a runtime-monitoring stage 104. FIG. 2 shows a flowchart 200 for an implementation of the preparation stage. FIG. 3 shows a flowchart 300 for an implementation of the runtime- monitoring stage.
[0046] The preparation stage is typically performed offline (i.e., when the application program is not executing). During the preparation stage 102, a process at operation 202, according to an example embodiment, uses program analysis to determine characteristics about the application program that is to be protected. The application program that the user intends to protect by process 100 is referred to herein as the "subject application program" or
simply the "application program". Many different types of program analysis can be applied, including, for example, static and dynamic analysis and source code and machine-code analysis. For example, the source code 212 of the application program, and binaries 214 resulting from compiling (e.g., using a compiling process 220) may be provided as input to the program analysis at operation 202. The program analyzer(s) are used to construct a representation of the subject application program. The constructed representation is sometimes referred to as an Intermediate Representation (IR) 210. The IR 210 may capture some or all of the characteristics such as the following regarding the application program that is being analyzed: instructions that may perform potentially dangerous memory operations, instructions that allocate and deallocate memory, data layout of the program, instructions that directly address globally allocated or stack-allocated data, functions that "recycle" heap- allocated buffers, functions that are "wrappers" for the system's heap-management library, and functions that implement custom memory-management libraries on top of the system's heap-management library.
[0047] Some embodiments identify instructions that perform potentially dangerous memory operations by disassembling all, or some portion of, possible instructions in the binary file and identifying instructions that access memory. Some other embodiments refine this program analysis by assuming that instructions that access a fixed memory location or stack offset is/are safe. The data layout of the program can be determined by processing "shape analysis". Shape analysis requires additional analysis of the generated IR 210 to determine which data structure abstractions are used by the application program and how these structures can be written and accessed at run time.
[0048] For some application programs, one or more characteristics of the application program such as those noted above, may be unavailable or inaccurate. In many such cases, embodiments can still operate to protect the system; however, it may provide a degraded level of protection, or require more extensive testing to ensure that the intended functionality of the subject application program is not compromised or broken.
[0049] At operation 204, the generated IR 210 is used to rewrite the subject program's binaries 216, including its executable files and libraries, if any. The rewriting operation 204 results in hardened binaries 218 that include protections provided by the embodiments. If test suites are available, they may be used to test the hardened binaries 218 to ensure the intended application program behavior is provided by the hardened binaries 218.
[0050] As noted above, often the preparation stage processing 102 can be performed in an offline manner. An alternative approach is to perform some or all of the preparation processing steps "on-the-fly" as the user runs the application program.
[0051] The runtime-monitoring stage 104 of protections provided by example embodiments occur when the protected application program is used (i.e., when the protected application program is executed). The protections for the application program and/or system can be implemented, as shown in the flow chart 300, by the hardened libraries 302, hardened executable(s) 304, and/or dedicated libraries 306 that are configured to perform checks for memory-safety violations by interposing between the application program and common system libraries, such as libc.so 308. As the hardened binaries run (i.e., are executed), they implement the protections inserted during the preparation stage 102. For example, the hardened binaries 304 may use a hardened runtime program data 310 including, for example, a modified data layout 310 that includes guard regions, maintains metadata of the embodiments, including, for example, current locations of guard regions, and checks for unsafe memory accesses, including accesses that should access the application program's data 310 but are accessing a guard region. When the hardened binaries 216 call procedures in system libraries 308 that manipulate memory (e.g., via libc.so 308), some example embodiments may intercept the call in its hardened libraries 306, and perform additional checking and updating of metadata, before calling the underlying library procedure if it is determined to be safe.
[0052] Example embodiments may use a combination of techniques to protect against memory corruption. For example, an embodiment may protect an application program by using one or more of guard regions, clearing stale data, altering de-allocation patterns and actions, taint inference and propagation, and one or more repair strategies.
[0053] Guard regions (sometimes also referred to as guarded regions) are regions of memory selectively identified by embodiments as areas that the application program has no valid reason to access. In other words, the application program, if operating correctly as designed, has no reason to access the identified guard areas. Embodiments may transform the layout of the application program's data so that guard regions are interspersed with the program's legitimate data. The guard regions may be located in memory based on the IR that is generated during the preparation stage. For example, guard regions may be placed at the end of heap blocks, in between procedure activation records, in between data objects on the stack, and/or in between global data objects. Some embodiment may also replace
instructions or procedure calls that can potentially perform unsafe memory accesses with code that checks that the locations to be accessed are not in guard regions before performing the accesses. Doing so helps ensure that the hardened program accesses data in a safe manner.
[0054] When a memory block is freed, some example embodiments may mark the memory as a guard region. The marking may include overwriting the memory with predetermined guard values. Checks for accesses of guarded regions will then detect if the memory is used after it has been freed, but before it has been reallocated (i.e. "use-after-free" fault). According to an embodiments, for any memory accesses in the application program where an accessed location is computed by adding an offset to a base address, an additional check of the value held at the base address is inserted to see if it contains an unallocated memory guard. If it does, the heap manager is consulted to determine if base and base + offset are located in the same heap block. If they are located in the same heap-block, a use- after-free error is identified.
[0055] In order to recover from, or repair, a use-after-free fault, some embodiments may save the current contents of the faulty block, and if a subsequent use of the block is detected, restore the saved contents and mark the block as "in use."
[0056] Some embodiments may clear stale data in regions that are reused as a technique for protecting against memory corruption. Embodiments may use various techniques to recognize when a program is reusing a region of memory. Before reuse of a region occurs, some embodiments may operate to clear the old data and/or convert the region to a class of guard region that indicates that the region should be initialized before being read. Certain example embodiments thus may supplement the garbage collector in a garbage- collected environment such as Java, for example, by inferring and marking used in memory segments. Doing so helps to ensure that data is scrubbed when it is no longer needed, thereby reducing the likelihood that malicious programs may be able to access forgotten-about and/or leaked memory areas and the data stored therein.
[0057] Another technique that may be used by some embodiments for protecting against memory corruption is the altering of de-allocation patterns and actions. Altering deallocation patterns and actions may, for example, include delaying re-introduction of newly freed memory to the available memory pool. When an application program explicitly deallocates a memory region by calling a function such as freeQ, or the like, example embodiments may delay the return of the memory to the pool of memory available for reuse.
In some embodiments, as soon as a memory block is placed in quarantine, for example, after a freeQ on the block, it is converted to a type of guard region that indicates it has been freed and should not be accessed by the subject application program. If some embodiments detect an access to a guard region that is in quarantine after a freeQ, a use-after-free error may be indicated to the user. Example embodiments may be able to repair the error by avoiding reallocation of the block.
[0058] Some example embodiments may be configured to use a combination of lightweight taint inference and taint propagation to recognize and/or repair certain classes of dangerous memory-usage errors such as use of uninitialized memory and buffer overruns.
[0059] When an example embodiment detects that a memory-corruption error is about to occur, it may use a variety of repair techniques to counter the threat. These include replacing the values that would be returned by an errant memory read and early termination of errant computation (e.g., in a loop, thread, or process). An embodiment may also report potential memory-corruption errors, which then allows administrators to check for attacks and allows developers to repair faults.
[0060] Some or all of these and/or other techniques may be implemented by the modifications made to the subject application program and in the libraries specific to certain example embodiments.
[0061] As described above, certain example embodiments may use guard regions to detect potentially unsafe memory accesses. In order to use utilize guard regions, the subject application program may be modified in embodiments (1) to intersperse guard region with the application program's data, (2) to update the embodiment's data about where the guard regions are located, and (3) to check that potentially unsafe instructions do not access a guard region in a disallowed manner. Interspersing guard regions as in (1) and updating the subject application program's data as in (2) involve modifications to the steps the application program takes to allocate and deallocate memory. Checking potentially unsafe instructions as in (3) involves modifications to instructions used to access memory.
[0062] In general, performing the modifications for (3) reasonably can be expected to incur a substantially higher runtime overhead than (1) and (2) in example implementations, as memory accesses may be expected to occur orders of magnitude more often than memory allocation and deallocation. The techniques that are selected for implementing (l)-(3) may depend on factors such as, for example, the performance characteristics of each subject execution platform, the context of individual instructions in the application program to be
instrumented, and/or the like. In order to make (3) effective, example embodiments may use a series of nested tests to check if the application program should be allowed to access the values at a given address. The earlier tests of the series of nested tests are designed to be cheap when compared to later tests. The early tests (i.e., tests occurring earlier in the nested tests), however, may have higher false positives than the later tests. It is possible an early check will report that an address should not be accessed when it is safe to do so. Subsequent checks are more expensive, but have a lower false positive rate. According to at least some embodiments, the final check has a vanishingly small probability of a false positive.
Hasabnis et al. in "Light-weight Bounds Checking," in Proceedings of the Tenth International Symposium on Code Generation and Optimization, New York, NY, USA, 2012, pp. 135-144, discusses some aspects of nested tests. In contrast to conventional techniques, some embodiments may maintain only a partial map of guard regions or no map at all, they may use a branch-free technique for the early tests, they may use different tests for different instructions in the same protected application, they may use different types of guard regions to detect different types of memory errors, and they may implement a recovery plan to provide safe, continued execution when an error is detected.
[0063] Guard regions are filled with predetermined guard values. A check (or as described below, multiple checks) that may be performed by certain embodiments to determine if an address A is safe, is to check if the value stored at memory location A is a guard value (e.g., a predetermined guard value written to that guard region by the
embodiment). If the value at A is not a guard value, A is assumed to not be in a guard region, and is assumed to be safe; if the value at A is a guard value, A may be determined to be in a guard region and therefore unsafe. In some embodiments, further checking may be performed to determine whether or not A is unsafe when the value at A is a guard value.
Example embodiments may perform the check for the guard value, perform subsequent checks, and select guard values, in accordance with the procedures described below. It will be appreciated that there are multiple techniques that can be used for some of these steps and, in certain example embodiments, multiple strategies may be used in any suitable combination, sub-combination, or combination of sub-combinations, e.g., to protect a single binary, e.g., as is made more clear below.
[0064] FIG. 4 illustrates example pseudo code 400 describing a technique that may be used in certain example embodiments to check for a guard value at memory location A when a subject application program includes an instruction instr that accesses n bytes at address A.
The technique shown in FIG. 4 has the advantage of being relatively simple (e.g., relatively easy to implement) and relatively cheap (e.g., relatively low processing and/or time overhead). Depending on the machine architecture, in some platforms, it may incur overhead for introducing additional memory accesses (to save and restore program state) and an additional conditional-branch instruction.
[0065] Certain example embodiments may opt to use a branchless implementation of some check(s) for guard values at an address A. The idea is to read the value v stored at .4 and perform a calculation that would cause a hardware exception if v is a guard value. For example, to check for the guard value in a register R, an embodiment may perform a bitwise exclusive-or of R with the guard value so that R will hold zero if and only if it original held the guard value. The embodiment may then use R in an address computation and memory access that will access protected memory if and only if R is zero. To use a SIGSEGV fault for a check, before beginning execution of the subject application program, certain example embodiments may initialize some static data as shown in FIG. 5. Thereafter, to perform the desired check (e.g., to determine "does A contain a guard-value byte?"), the example embodiments may insert example instrumentation such as that shown in FIG. 6 in the subject application program.
[0066] In addition to avoiding the use of branches, instrumentation similar to that shown in FIGs. 5-6 may require saving and restoring less state. If certain example embodiments can identify a free register at the location where it wants to insert the check, it is possible that no state will need to be saved or restored. A mix of different checking strategies may be used for different instructions in the subject program.
[0067] According to some embodiments, for each instruction with a potentially unsafe memory access in the subject application program, a customized instruction sequence may be used to check if the instruction is safe. For some potentially dangerous instructions, certain embodiments may use a chain of compare-and-branch instructions; for others, embodiments may use one of the hardware-exception mechanisms described in the previous section. Instructions may be identified as dangerous based upon a predetermined list of potentially dangerous instruction types, predetermined parameters or ranges of parameters values identified as potentially dangerous, and/or based on other techniques. Some example embodiments may use dynamic instrumentation to insert the checks and may also change the checking instrumentation based on online profiling information.
[0068] As described above, certain example embodiments may perform an initial check for a guard value that may be followed by a more thorough check. This initial check is quick (e.g., low overhead in processing/time) but may not be accurate. Using a technique referred to herein as bipartite guard values, the initial check may be for a 1-byte (8 bit) small- guard value, and the subsequent more expensive check may be for a full 8-byte (64 bit) full- guard value. To check if a memory access to address A is in a guard region, the system may first check if the byte at address A holds the small guard value. If it does, the system can then check if the 8-byte aligned word containing A holds the bipartite guard value. If it does, either it is assumed that A is in a guard region, or one or more expensive checks may be performed. If the memory access to be checked is for 8-bytes, then the small-guard check may be skipped, as the full-guard check should add no measurable overhead. The small guard value may be selected randomly, but preferably excluding the most common 8-bit values, such as 0 and -1. The small guard value may be placed in the bipartite guard value at offsets that might be addressed by aligned, strided accesses on the target machine. For example, on a little-endian, byte-addressable machine, this would be byte offsets 0, 4, 6, and 7 (See FIG. 8). The full (e.g., bipartite) guard is constructed at the beginning of program execution, as shown (assuming a little-endian machine) in the pseudo code of FIG. 7, for example. The bipartite guard value may be placed in all guard regions when they are created and removed before the region is reused. In some embodiments, the bytes of the bipartite guard that do not hold the small-guard value hold bytes selected uniformly at random.
[0069] FIG. 8 shows the layout of a bipartite guard 800 on a little-endian machine, according to certain example embodiments. This layout is motivated by the observations that compilers usually try to align data on word boundaries, and that loops that overrun or underrun a buffer are usually accessing the buffer in a power-of-two stride (e.g., 1-byte, 2- bytes, 4-bytes, or 8-bytes on an 8-byte machine). Location 802 in the bipartite guard includes a small guard value, and location 804 includes a randomly selected byte value. As shown in FIG. 9, the layout 900 of the bipartite guard, including the repetition of the predetermined small-guard value, ensures that aligned, strided buffer accesses will land on a small-guard value in the bipartite guard. Byte 902 represents the byte 802 in the bipartite guard 800. Other small guard values are at offsets 4, 6 and 7. Randomly selected byte values are at offsets 1, 2, 3 and 5. The randomly selected bytes of the bipartite guard (e.g., at offsets 1, 2, 3, and 5) make it hard to guess the value of the full guard and vanishingly unlikely that the full guard value may arise by chance during the execution of the subject application program.
The table rows labeled 1, 2, 4 and 8 in layout 900 represent strided accesses at 1 byte, 2 bytes, 4 bytes and 8 bytes, respectively. In FIG. 9, bytes of the bipartite guard accessed during strided accesses of the various offsets are shown with a marking (a star marking) within table cells corresponding to a particular byte of the bipartite guard that is accessed in each type of strided access. For example, when the stride is at 8-bytes only the first byte (i.e. 0th byte, byte identified as 902) of the bipartite guard is accessed, regardless of whether the iteration order is forward or backwards through memory (see the row identified as 8 in FIG. 9). When the stride is 2, a buffer overrun (from a forward iteration through the buffer) will result in an attempted access of byte 0 and a buffer underrun (from a backward iteration through the buffer) will result in an attempted access of byte 6 (see the row identified as 2 in FIG. 9); since both bytes 0 and 6 hold a small guard value, a full guard check is triggered and any attempted overrun or underrun is detected and prevented before other bytes of the guard are accessed.
[0070] An alternative to using bipartite guards, or an approach that may be used in combination with it, is to maintain guard maps. Guard maps may provide even stronger protections against memory corruption by, for example, protecting against misaligned accesses by an attacker. Guard maps are one or more maps maintained by certain
embodiments to keep track of where in memory the guard regions are located. The maps are updated every time memory is allocated or deallocated. The guard value may include repeated copies of a randomly selected 1-byte value. The initial check may always check for M-copies of the guard value (e.g., small-guard value), where n is the number of bytes that are accessed in the instruction that is being checked. The more expensive check consults the maps for the presence of the untrusted address: if it is in a guard region, then the attempted access is unsafe.
[0071] Certain example embodiments may use a trie or other suitable data structure to implement a single guard map for the entire application program. However, in more secure embodiments, embodiments may use more than one guard map, or different types of guard maps for different memory regions. FIG. 10 illustrates an example guard map.
[0072] For each thread stack, example embodiments may use a direct map cache, e.g., that contains a single bit for each byte in the stack. Embodiments may use direct mapping between the region of the stack memory that is being mapped and the map. Each byte of memory in the stack can be represented by a single bit in the map. Typically, functions in the subject application program may have a fixed layout for the function's local, temporary data
that is stored on the stack. An embodiment may create a template map for each activation record. When a function is invoked and space for its temporaries is allocated on the stack, the embodiment can copy the function's associated map template directly onto the map.
[0073] A direct-map cache, in certain embodiments, is similar to a one-level trie. An advantage of using the direct-map cache is improved speed of update and access.
Embodiments may leverage the fact that every time an activation record for procedure foo is created on the stack, it may use exactly the same data layout, and hence, the guard regions may be exactly the same. This means that example embodiments can prepare a template that contains the appropriate bit pattern representing the locations of the guard regions in foo's activation record and simply copy it to the end of the map for the currently running thread. Similarly, a template can be used for initializing the guard values in the activation record.
[0074] For heap-allocated memory, example embodiments may leverage the internal data structures of the heap-manager to also keep track of the guard regions in the heap.
Certain example embodiments may be such that their implementation of the heap-manager may already maintain the requisite information, so that no additional overhead or data structure is necessary. For example, in some embodiments, the heap manager may already map all of the blocks in the heap, and leverage the existing heap map to infer the location of guards in the heap.
[0075] For statically-allocated memory (such as, for example, the program's "global data"), certain example embodiments may use a hash table or similar data structure to store the locations of the guard regions, which do not change during the program's execution. Some embodiments may use standard data structures for representing sets (e.g., hash tables) to store the fixed set of guard regions.
[0076] According to certain example embodiments, implementing the more expensive check for guard values (in contrast to the relatively quick initial test), includes separately checking each map. In some embodiments, the multiple maps may be checked sequentially, and in other embodiments two or more of the maps may be checked in parallel.
[0077] A potential danger in using guard maps is that an attacker may be able to force an errant-memory update that corrupts the map, thereby allowing more latitude in forcing other unsafe memory accesses. The inventors have observed that with a particular implementation of a guard map (e.g., using a direct-map cache), the majority of locations in a guard map may contain the value zero. Accordingly, certain example embodiments store the bytes of the guard map after exclusive-or'ing them with the small-guard value, so that the
majority of bytes in the guard map are the small-guard value. Furthermore, certain example embodiments mark the entire guard map as a guard(ed) region. As noted above, guard regions are regions of memory selectively identified by embodiments as areas that the application program has no valid reason to access. In this manner, example embodiments may use their checks on potential errant-memory updates to protect the integrity of its own guard maps. Similar techniques may be used to guard one or more types of other critical data.
[0078] Certain example embodiments may use different guard implementations for different regions of memory. A technique for efficiently implementing and checking for guard regions may be based on hybrid guard values. One attractive solution may be to protect stack memory with bipartite guards (thereby potentially obviating the need for guard-map updates when allocating/deallocating stack frames), and use homogenous guards to guard heap memory (where the guard map may be provided by the native heap manager). Using this configuration, the instrumentation for checking whether address A is safe can be implemented using the pseudo-code shown in FIG. 11.
[0079] The configuration shown in FIG. 1 1 can be extended in such a way that both types of guards are used in the heap: when the application program requests a heap block with N bytes, certain example embodiments may increase Nto allow space for (one) guard value and then round up to the next power of two; it actually reserves M > N bytes. Certain example embodiments place a homogenous guard at the end of the M reserved bytes. The heap manager in some example embodiments provides a capability to look up an arbitrary address and determine if it is in an allocated block, and if so, the location and size of the block. Using this capability certain example embodiments implement a guard map for the homogenous guards placed at the end of blocks: if an address is at the end of the block, it is in the guard region. However, the malloc implementation in at least some embodiments need not necessarily record the original requested size, N, anywhere. Consequently, overruns that exceed Nbut still do not hit the guard at the end of the M-byte block may not be detected. To detect such overruns, some embodiments may place a bipartite guard after the Nth byte of the allocated block and prior to the homogenous guard at the end of the block. As described above, this provides the full strength of the homogenous guard (which provides better protection against misaligned accesses) for the end of the allocated block, while still providing some protection for overruns that surpass the Nth byte in the middle of the buffer.
[0080] In some embodiments, M may be greater than or equal to 2 *N. In these cases, certain embodiments may place a homogenous guard at the (M/2)th byte, which is still easily
located using the heap-management data structures. The presence or absence of a second, middle-of-buffer guard can be indicated with a single bit, which is much less than the amount of space needed to store N.
[0081] In some example implementations, any access to a guard region may be disallowed to a subject application program. In certain example embodiments, there additionally are (optionally) different classes of guard regions, or different guard classes. Different guard classes are given different semantic interpretations, e.g., as to what types of memory accesses (read or write) should be allowed for guard of a given class. The guard classes used by certain example embodiments may include, but are not limited to: read/write guards, read guard, page guard, unallocated memory guards, and cloneable read guards. Embodiments differ from conventional approaches by unifying the detection of different types of memory errors around the concept of guards and using different types of guards to detect different types of memory errors.
[0082] Read/write guards are configured so that any attempted read or write access indicates an error or attempted exploit of the subject program. Some form of read/write guards were introduced in K. Serebryany, D. Bruening, A. Potapenko, and D. Vyukov, "Address Sanitizer: A Fast Address Sanity Checker," in USENIX Annual Technical
Conference, 2012, pp. 309-318.
[0083] Read guards are configured so that any attempted read access indicates an error or attempted exploit, but write accesses are allowed and cause embodiments to remove the guard. Read guards may be useful for detecting when the program attempts to read memory it has not yet initialized. An embodiment may, for example, insert read guards in newly allocated memory and memory that holds stale data; check potentially dangerous read accesses to ensure they are not accessing a read guard; and remove corresponding read guards when a write access to a read guard is detected.
[0084] Page guards are configured so that attempted read or write access of any byte on the page containing the guard indicates an error or attempted exploit. Embodiments may place page guards on code pages and use them to detect attempts to scan code pages, e.g., for return-oriented programming (ROP) gadgets. ROP is described in A. Bittau, A. Belay, A. Mashtizadeh, D. Mazieres, and D. Boneh, "Hacking blind," in Proceedings of the 35th IEEE Symposium on Security and Privacy, 2014.
[0085] Unallocated memory guards ("unalloc-mem") are configured such that any attempted read or write access indicates an error or attempted exploit of the subject program.
Example embodiments, place unallocated memory guards in memory (e.g., heap memory) that the program was previously using but subsequently returned to the heap manager. An access of an unallocated-mem guard indicates a use-after- free error, which the embodiments may attempt to repair.
[0086] Cloneable read guards are configured to disallow read accesses, except for the purpose of cloning the protected memory region. Cloneable read guards may be valuable for avoiding or reducing false positives in the presence of certain types of initialization patterns.
[0087] The implementation of guards described above in one or more embodiments may be modified as follows to support different "guard classes." Small guard values can be the same for all guard classes. There may be different bipartite guards for each guard class, indicated by a few bits in one of the random bytes of the guard class. Guard maps are extended to indicate the class of each mapped guard. Guard checks are extended to consider the guard class. For example, the initial, cheap check can be the same for all checked memory accesses. The secondary check may differ depending on the type of access. For example, a read access may fail if any type of guard is found, and a write access may fail if any class of guard except a read guard is found. When a read guard is found upon a write, the read guards may be removed, and the check may be indicated having passed. A bulk access (i.e., a library call that reads or writes to a range of memory) may fail for page accesses that include a page guard.
[0088] When guard classes are implemented, the response provided when a check fails can also depend on the class of guard that caused the check to fail. For example, upon an attempted access of an unalloc-mem guard, an embodiment may attempt to restore the memory block, mark the block as allocated, and continue execution.
[0089] In addition, the different guard classes may be placed in different situations. If embodiments uses read/write guards to delineate program data, such guards may be placed at the end of heap blocks. Read guards may be placed in some or all of newly allocated heap or stack memory, and/or in memory that could have been written or overwritten by a library call, but was not. For example, a call read (fd, bu M) may read up to Mbytes from fd into buf If n < M bytes are actually read, then embodiments may place read guards in the (n-M) bytes of buf after the portion that was accessed by the call to read.
[0090] Certain example embodiments may optionally place page guards on pages holding code or other sensitive metadata, such as guard maps or heap maps. Hooking code, e.g., library calls that scan memory and checking that the scan may not access any page
guards, can be used to detect unwarranted page scans. Moreover, certain example embodiments may optionally place unallocated-memory guards on heap blocks before they are placed into a free quarantine or they are returned to the heap manager.
[0091] As the subject program executes, the layout of its data in memory may change because memory regions are constantly allocated and released (deallocated). Memory that has been deallocated may subsequently be reused to fulfill a new memory-allocation need. During the preparation stage, an embodiment operates to learn the program's intended data layouts and modifies the layouts to allow room for guard regions. During the monitoring stage, embodiments help ensure that the guards are properly maintained (e.g., in accordance with the modified layouts) as memory is allocated and deallocated. As mentioned above, different mechanisms may be utilized for stack memory, heap memory, and static memory.
[0092] The subject application program may have multiple threads, each with a runtime stack that is typically used to store temporary data, such as the arguments and variables for a function invocation. On a function call to a function foo, a new region is allocated on the "top" of calling thread's stack, referred to herein as the activation record for foo. When foo 's execution completes, its activation record is (implicitly) deallocated; the memory may be reused on subsequent function calls. At any time during execution, embodiments are configured to ensure (a) that there are guard regions delineating the data objects on the "live" portions of the runtime stacks, and (b) that it can reliably determine where these guard regions are.
[0093] Ideally, any used memory on the stack (e.g., memory past the current stack top) would be tracked as belonging to one or more guard region(s). One technique is to update the guards and guard maps on every allocation and deallocation of an activation record. On a function call to a function foo (causing the creation of an activation record), example embodiments modify the initialization of/oo's activation record to initialize the desired guard regions in the activation record with guard values. It may also update the guard maps with the locations of the new guard regions. When foo's activation record is deallocated (either by a normal return or a non-local control transfer, such as an exception), the guard values are cleared, and the guard maps are updated to indicate those guard regions have been removed.
[0094] In some cases, the above strategy may have the lowest possible runtime overhead. In other cases, it may be inefficient, and it may be overly conservative. In particular, the above strategy assumes that when an activation record is deallocated, none of
the memory is protected (in a guard region). In order to ensure that the system is protected, it may be desirable to protect all of that memory. One option is to fill the entire deallocated region with guard values and update the guard map (if any) appropriately. If the granularity of the guard map is chosen to match the activation record alignment, the update may be made considerably more efficient. Another option is to simply leave the guard values and guard map alone (e.g., to not change) during deallocation. This is extremely cheap in terms of processing time and processing cost, and provides partial protection for the deallocated region. In both of these cases, the extra guards are removed (at any time) before that region of the stack is re-used for a different allocation record. This can be done, for instance, when new activation records are allocated.
[0095] At least some example embodiments may be configured to intercept calls from the subject application program to system libraries, such as, for example, the heap- management library (malloc, realloc,free, etc.). The embodiments may entirely replace the heap-management library with an implementation that provides greater security. The DieHard and DieHarder libraries described in E. D. Berger and B. G. Zorn, "DieHard:
probabilistic memory safety for unsafe languages," Proceedings of the 2006 ACM SIGPLAN Conference on Programming Language Design and Implementation, 2006, pp. 158-168, and G. Novark and E. D. Berger, "DieHarder: securing the heap," Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010, pp. 573-584, are example libraries that provide greater security. In addition, on a call to allocate heap memory, example embodiments may increase the size of the requested allocations to allow room for a guard value, and place a guard at the end of the allocated block. The embodiments may also optionally clear the other bytes in the heap block to ensure that no stale data is leaked. Other aspects of the example embodiments' mechanism for maintaining guards in heap memory may depend on the heap-management library that is ultimately used.
[0096] Some heap-management libraries (e.g., such as DieHard) are able to efficiently determine if an address resides in a heap block, and if so, what the properties of that block are (i.e., start and end addresses, size, is it currently allocated, etc.). Certain example embodiments use this capability to implement a guard map for the heap. If for some reason the embodiments' heap-management library cannot be used, then the embodiments may use an external data structure, such as, for example, a trie, to implement the guard map for the heap. Using this approach, the data structure can be updated every time a call to allocate or free memory is intercepted.
[0097] A third option is to use bipartite guards in the heap instead of a guard map.
[0098] When the subject application program requests that a block of heap memory be deallocated, or freed, it indicates that the program does not intend to access that block again. Existing references to the block at the time it is freed are considered to be stale. The heap-management library is free to use the block to satisfy subsequent requests for memory. Use of a stale reference can lead to use-after-free vulnerabilities (e.g., as described in CWE 416), which cause the stale references to be aliased with new references when the block is reallocated to fulfill a new allocation request.
[0099] Example embodiments may use many different techniques to reduce the likelihood of exploits of use-after- free vulnerabilities. Some embodiments, for example, may queue the program's requests for deallocation of blocks, thereby temporarily prolonging the "lifetime" of the block allocation before it is reclaimed for reuse. This technique protects against use-after-free vulnerabilities because an exploit cannot succeed until the block is reallocated.
[00100] Some embodiments may randomize the order in which deallocation requests are processed from the free list. This technique protects by making it difficult to predict the circumstances under which a block may be reallocated, which is an operational principle behind many successful exploits.
[00101] Some embodiments may protect against use-after-free vulnerabilities by, at some point before a block is re-allocated (e.g., before it officially deallocates the block by marking it available for allocation), storing a copy of some bytes of the block into the extra padding at the end of the block and/or overwrite some or all of the block with unalloc-mem guard values. One technique is to only place an unalloc-mem guard at the beginning of the heap block, although some implementations for checking for guards may not always catch accesses past the first word of the block. Some compensation for this may be based on the observation that frequently it is possible to infer the beginning of a block for a memory access that may access the middle of the block. For example, given a memory address (e.g., base + offset), often base may point to the beginning of the block, while (base + offset) may be in the middle of the block. Given a potentially unsafe memory access to (base + offset), some embodiments may check base for an unalloc-mem guard. If the guard values are accessed before the block is reallocated, (i) it indicates a use-after-free vulnerability and (ii) it may be detected. At that point, the embodiments may execute any of several repair strategies.
[00102] The heap-management implementation of certain example embodiments may allocate from the set of free blocks at random. As with some of the above described defenses, this makes it difficult to predict when the block may be reallocated, and it prolongs the time before the block is reallocated. Only when the block has finally been reallocated does a use- after- free exploit become possible.
[00103] The subject application program's static memory includes global variables and file-scope and function-scope static variables that have a fixed location potentially for the lifetime of the program. Each dynamic library used by the subject application program may have its own static data segment, which has a fixed layout while the library remains loaded. During the preparation stage, an example embodiment may modify the layout of static data to insert guard regions. During the monitoring stage, the example embodiment may use a hash table (or other suitable data structure) to track the locations of guard regions in the
application program's static memory. When the application program's image or a dynamic library is loaded into memory, the example embodiment may initialize the guard regions in the static memory with guard values and update the guard map for static memory. When a dynamic library is unloaded from memory, the guard map for static memory is adjusted appropriately.
[00104] Application programs use multiple mechanisms to recycle their memory and keep their overall memory footprint low: when the application program has finished using a memory block for one purpose, it is repurposed for a different use, for example, by being "released" and then "reallocated." Many programs also contain defects such as "use of uninitialized memory" that can lead to sensitive data being exfiltrated from recycled memory regions. For example, here is one sequence of actions that might exfiltrate sensitive information to an attacker: the program allocates a block of memory; the program fills the block with sensitive information, e.g., a password; the program releases the block (without clearing its contents); the program reallocates the block for a new purpose; and subsequently, under the control of an attacker, the program reads and reports the contents of the block before overwriting some or all of the contents (i.e., the program reads contents that are "uninitialized" since the reallocation. As a result, the sensitive contents of the block from its last use are reported to the attacker.
[00105] Example embodiments use many heuristics to detect when memory is being reused and there may be a risk of leaking the old contents of the memory. The embodiments
may be configured to use combinations of analyses and heuristics to determine when a buffer is being partially or completely reused.
[00106] Some embodiments may use explicit allocation to determine when a buffer is being partially or completely reused. In the explicit allocation technique, when an embodiment detects memory being (re)allocated via a call to mallocQ or the creation of a new procedure frame, it may assume the new memory is being reused and should be considered "uninitialized."
[00107] Some embodiments use inferred recycling functions to determine when a buffer is being at least partially reused. When a function might return uninitialized heap memory (obtained via a call to malloc) or some other heap block, then certain embodiments may assume the function is implements heap-block recycling. A function that implements heap-block recycling arranges for reuse of heap blocks without returning them to the heap manager. Embodiments may rely on their respective implementation of malloc to dynamically check if a value returned by a potential recycling function is the beginning of a heap block.
[00108] Some example embodiments use a technique referred to as "fill gaps" in order to detect at least partial reuse of the freed memory block before re- initialization. Many library procedures may fill a variable amount of a buffer, up to some maximum number of bytes, M. At runtime, when the function actually fills just n bytes where n < M, the remaining (M - n) bytes are called the fill gap. According to the fill gap technique, example embodiments may assume that fill gaps should be considered to be uninitialized.
[00109] Some example embodiments use a technique referred to herein as "file- descriptor taint" in order to detect at least partial use of freed memory blocks. According to this technique, an example embodiment hooks calls to read(), memcpyQ, and/or other memory-copying functions. The example embodiment may use space at the end of each heap block to record some file-descriptor taint about each heap block. When the application program reads input into a buffer and overwrites pre-existing data with tainted data from a different file descriptor, the example embodiment may conclude that the block is being reused, and that the old data can be cleared. This may happen during a call to readQ or to memcpyQ or some later functions.
[00110] Another technique used by some embodiments for recognizing that a heap block is being reused includes detecting when the following conditions hold: (1) the heap block is returned from a function that sometimes returns uninitialized memory acquired
directly from malloc; and (2) the heap block is returned from a function that appears to take few external arguments, e.g., only a size argument. In these situations, it may be reasonable to assume that the function is "recycling" a heap block. In some embodiments, the heap block can be cleared before being returned. Yet another technique used in some
embodiments for recognizing that a heap block is being reused includes recognizing when the heap block contains data originally read from an external source and that data is being overwritten with different data from an external source. In these cases, it may be reasonable to assume that the block is being used as a "read buffer" and clear the entire contents of the buffer, or at least the maximum extent of the buffer occupied by previously read or to-be- occupied by newly read data.
[00111] When an example embodiment determines that memory is being reused— e.g., that the current contents are stale and the memory should be overwritten before it is reused— it may use a combination of the following strategies: (1) clear the memory; (2) place a read guard in the memory and modify unsafe read instructions to first check for the read guard.
[00112] Another technique used in some embodiments for identifying memory regions that hold stale data intercepts code (e.g., library calls, inlined procedures, or loops) that may write a variable amount of memory up to a specified maximum. Any memory between the end of what is actually written and the specified maximum is considered to hold "stale" data that the subject program no longer needs.
[00113] When an example embodiment detects a vulnerability, it may use one or more of several repair techniques to remove the vulnerability or to reduce the risk posed by the vulnerability. In some cases, the embodiment may perform the repair such that the application program can continue execution.
[00114] As noted above, an example embodiment may sometimes detect an attempt to access a block that the application program previously freed (indicated that it was done with the block). In these cases, the embodiment may attempt to restore the values in the block, if they've been saved, or clear the block, mark the block as allocated and then allow the program to continue execution. Marking the block as allocated has the effect of reviving the stale references and ensuring that no new references may be made that alias the stale references; the stale references can be safely used as if the requested deallocation never happened. The application program execution may likely continue normally, and no use- after-free exploit may be possible.
[00115] The example embodiment may also note the calling context that caused the use-after- free. If a particular use-after- free pattern is observed frequently, embodiments may start tagging blocks according to where they were allocated, correlating the allocation tag with the use-after- free errors, and then taking appropriate responses when a free is performed on a block with an allocation-tag correlated with frequent use-after-free errors, e.g., by increasing the delay for that free.
[00116] In some cases, an example embodiment may detect an attempted overrun of a heap-allocated buffer. In these situations, there are several steps the embodiment may take to attempt to "grow" the buffer, essentially by performing a reallocation ("realloc()") on the buffer. The reallocation may differ based on whether or not the neighboring heap block is allocated. If the block is not allocated, the embodiment may mark the block as allocated, and allow the "overrun" to proceed into the neighboring block. Effectively, the heap block is increased in size. If the neighboring block is already allocated, then the embodiment may take the following steps: allocating a larger block at some other location in memory; copy all of the data in the original heap block to the new heap block; overwriting all of the data in the original heap block with a homogeneous guard value; and redirecting all future attempts to access the original block to instead access the new block. The overwriting of all of the data in the original heap block ensures that any attempted access to the original heap block may be detected.
[00117] Some embodiments may be configured to replace over-reads with
manufactured data. For example, when an example embodiment detects an attempt to read past the end of a buffer, instead of performing the read (and potentially releasing sensitive information), it may replace the results of the read with manufactured data and allow the program to continue execution. For example, the embodiment may return common sentinel values, such as 0 and -1, or random data.
[00118] Some embodiments may be configured for early loop termination for overwrites. For example, when an embodiment detects an attempt to write past the end of a buffer, instead of performing the write, it may be configured to terminate the loop that is attempting the write.
[00119] A technique used in some embodiments for automatically recovering from overruns of heap blocks when the adjacent heap block is not currently allocated includes: automatically detecting when the overrun occurs by detecting an attempted access of the
guard region at the end of the heap block; automatically marking the adjacent heap block as allocated; and/or allowing the overrunning code to continue into the adjacent block.
[00120] Another technique used in some embodiments for automatically recovering from overruns of heap blocks may include: automatically detecting when the overrun occurs by detecting an attempted access of the guard region at the end of the heap block; allocating a new, larger block somewhere else in the heap; copying the data from the original block to the new block; converting the original block into a guard region so that future attempts to access the original block may be detected as attempted accesses to a guard region; and when future accesses to the original block are detected, redirecting the attempted access to instead access the new block. For write accesses, for example, the corresponding address of the new block can be updated. For read accesses, the corresponding values from the new block can be returned. In order to implement these accesses, loops and/or library calls that access a range of addresses beginning in the original block and continuing beyond its (original) end may be identified, and the accesses may be redirected to the new block.
[00121] It will be appreciated that certain example embodiments may run in connection with a standalone or networked computer and/or computer system comprising a plurality of computer nodes. In an example runtime environment, for example, an instance of a process for hardening application programs according to an embodiment may run in memory. Components may include, for example, memory, at least one processor, a data store, an OS kernel, etc. It will be appreciated that such an environment may be used in connection with, or be simply backed by an embodiment as shown in FIG. 3. It also will be appreciated that certain example embodiments may work in any design time and/or runtime environment including, for example, Windows, Linux, Unix, MacOS, and/or other operating systems present on the example electronic devices mentioned above. In a similar vein, the techniques described herein may be used in any suitable combination, sub-combination, or combination of sub-combinations, e.g., as appropriate to the programming language, runtime environment, etc. With respect to the former, for example, certain example embodiments may be made to work with programming languages including, for example, C, C++, Assembler, Java, etc. The programming language may be a compiled or interpreted language, and may run on a physical or virtual machine.
[00122] It will be appreciated that as used herein, the terms system, subsystem, service, programmed logic circuitry, and the like may be implemented as any suitable combination of software, hardware, firmware, and/or the like. It also will be appreciated that the storage
locations herein may be any suitable combination of disk drive devices, memory locations, solid state drives, CD-ROMs, DVDs, tape backups, storage area network (SAN) systems, and/or any other appropriate tangible computer readable storage medium. It also will be appreciated that the techniques described herein may be accomplished by having a processor (e.g., central processing unit (CPU) or specialized processor) execute instructions that may be tangibly stored on a computer readable storage medium.
[00123] While the invention has been described in connection with what is presently considered to be the most practical and preferred embodiment, it is to be understood that the invention is not to be limited to the disclosed embodiment, but on the contrary, is intended to cover various modifications and equivalent arrangements included within the spirit and scope of the appended claims.
Claims
1. A computing system comprising at least one memory and at least one processor configured to execute a security-enhanced application program by performing operations comprising:
arranging a plurality of guard regions in the memory in relation to data objects formed by the application program;
identifying an access by the application program to a guard region arranged in the memory as a disallowed access; and
modifying the execution of the application program in response to the identifying, the modifying being in order to prevent exploitation of the memory and/or to correctly execute the application program.
2. The computing system according to claim 1, wherein the identifying an access comprises at least one of (A) tracking memory object creation and deletion, and (B) detecting whether a memory access by the application program is a disallowed access to a guard region.
3. The computing system according to claim 2, further comprising operations including placing bipartite guards in the guard regions arranged in memory, the bipartite guards each having a predetermined number of bits,
wherein the detecting whether a memory access is a disallowed access comprises: determining an address associated with the memory access; and determining whether at least one of the bipartite guards placed in the guard regions is located at the determined address.
4. The computing system according to claim 3, wherein the placing bipartite guards comprises placing a predetermined small guard value in one of the bipartite guards at one or more predetermined offsets, and
wherein the determining whether at least one of the bipartite guards are located at the determined address comprises checking whether the predetermined small guard value is positioned at the determined address.
5. The computing system according to claim 4, wherein the placing the bipartite guards further comprises arranging uniformly randomly selected bytes in parts of the bipartite guards where no predetermined small guard value is placed, and
wherein the determining whether at least one of the bipartite guards are located at the address further comprises, if the predetermined small guard value is positioned at the address, determining if a multi-byte aligned word containing the determined address holds a full guard value.
6. The computing system according to claim 5, wherein the predetermined small guard value is one byte in size.
7. The computing system according to claim 5 or claim 6, wherein the bipartite guard is placed in all guard regions when they are created and is removed before the region is reused
8. The computing system of any one of claims 5-7, wherein the determining whether at least one of the bipartite guards are located at the address further comprises arranging a computation that will cause a runtime exception if and only if the full guard value is present.
9. The computing system of any one of claims 4-8, further comprising operations including performing an exclusive-or operation of data in a guard map with a guard value in order to populate a substantially larger portion of the guard map with the guard value.
10. The computing system of any one of claims 2-9, wherein the tracking comprises at least one of (A) for a portion of the memory that is a stack memory, directly mapping between a region of the stack memory that is being mapped and the map, (B) for a portion of the memory that is a heap memory, using a heap map to infer locations of the guards in the heap, and (C) for a portion of the memory that is a static memory, using standard data structures for representing sets to store a fixed set of said guard regions.
11. The computing system of claim 10, wherein the tracking comprises detecting a reuse of a block in a heap portion of the memory based upon whether (1) the block is returned
from a function that sometimes returns uninitialized memory acquired directly from a memory allocation, and/or (2) the block is returned from a function having fewer than a predetermined number of external arguments.
12. The computing system of claim 10, wherein the tracking comprises detecting a reuse of a block in a heap portion of the memory based upon whether (1) the block contains data originally read from an external source, and (2) the data is overwritten with different data from an external source.
13. The computing system of any one of claims 2-9, wherein the tracking comprises protecting a first set of areas of the memory using said bipartite guards and without guard maps, and protecting a second set of areas of the memory using homogenous guard values and guard maps.
14. The computing system of any one of claims 2-9, wherein the tracking comprises when a data object is freed by the application program, marking a region of the memory used by the data object as a guard region, and wherein the marking includes overwriting the region with guard values.
15. The computing system of claim 14, wherein freed memory regions are marked with a dedicated unalloc-mem guard value distinct from other classes of guard values and detecting a use-after- free error comprises checking for the unalloc-mem guard value.
16. The computing system of claim 14 or claim 15, wherein the tracking further comprises, when a data object is freed by the application program, before said overwriting, saving current contents of the region; and if a subsequent use of the region is detected, restoring the region using the saved contents.
17. The computing system of any one of claims 14-16, wherein determining if an access to a memory location computed as (base + offset) is a disallowed access further comprises checking if base is in a guard region.
18. The computing system of claim 17, wherein determining if an access to a memory location computed as (base + offset) is a disallowed access further comprises checking if base and (base + offset) are in the same heap block.
19. The computing system according to any one of claims 1-18, wherein modifying the execution of the application program comprises:
automatically determining when a memory overrun occurs by detecting an attempted access of the guard region at the end of a block in a heap portion of the memory;
automatically marking another block adjacent to the block as allocated; and/or providing for overrunning code to continue into the marked block.
20. The computing system according to any one of claims 1-18, wherein modifying the execution of the application program comprises:
automatically determining when a memory overrun occurs by detecting an attempted access one of the guard regions at the end of a first block in a heap portion of the memory; allocating a second block in the heap portion, wherein the second block is larger than the first block;
copying data from the first block to the second block;
converting the first block into a guard region such that subsequent accesses to the first block are detected as attempted accesses to one of said guard regions; and
when a subsequent access to the first block is detected, redirecting the access to instead access the second block.
21. The computing system according to any one of claims 1-20, further comprising operations including:
inserting read guards in newly allocated memory and/or memory that holds stale data; checking read accesses to determine whether an inserted read guard is accessed, thereby detecting runtime uses of uninitialized memory and/or potential information leaks; and
removing an inserted read guard when a write access to the inserted read guard is detected.
22. The computing system according to any one of claims 1-21, further comprising operations including:
intercepting library calls writing a variable amount of said memory up to a specified maximum; and
identifying portions of the memory between the end of said variable amount written and the specified maximum as stale data that the subject program no longer uses.
23. The computing system according to any one of claims 1-22, further comprising operations including at least one of (A) detecting an attempted scan of the memory by placing page guards on selected pages, and (B) detecting an attempted scan of the memory by inserting hooks in selected portions of code to check for the page guards.
24. A method for executing a security-enhanced application program on a computing system comprising at least one memory and at least one processor, comprising: arranging a plurality of guard regions in the memory in relation to data objects formed by the application program;
identifying, automatically by the at least one processor, an access by the application program to a guard region arranged in the memory as a disallowed access; and
modifying, automatically by the at least one processor, the execution of the application program in response to the identifying, the modifying being in order to prevent exploitation of the memory and/or to correctly execute the application program.
25. A non-transitory computer readable storage medium storing a security- enhanced application program which, when executed by a processor of a computing system including a memory, causes the computing system to perform operations comprising:
arranging a plurality of guard regions in the memory in relation to data objects formed by the application program;
identifying, automatically by the at least one processor, an access by the application program to a guard region arranged in the memory as a disallowed access; and
modifying, automatically by the at least one processor, the execution of the application program in response to the identifying, the modifying being in order to prevent exploitation of the memory and/or to correctly execute the application program.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP18212260.6A EP3474148B1 (en) | 2014-07-23 | 2015-07-21 | Systems and/or methods for automatically protecting against memory corruption vulnerabilities |
EP15824645.4A EP3195178B1 (en) | 2014-07-23 | 2015-07-21 | Systems and/or methods for automatically protecting against memory corruption vulnerabilities |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201462028004P | 2014-07-23 | 2014-07-23 | |
US62/028,004 | 2014-07-23 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2016014567A1 true WO2016014567A1 (en) | 2016-01-28 |
Family
ID=55163649
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2015/041381 WO2016014567A1 (en) | 2014-07-23 | 2015-07-21 | Systems and/or methods for automatically protecting against memory corruption vulnerabilities |
Country Status (3)
Country | Link |
---|---|
US (2) | US9990492B2 (en) |
EP (2) | EP3474148B1 (en) |
WO (1) | WO2016014567A1 (en) |
Families Citing this family (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3474148B1 (en) | 2014-07-23 | 2019-12-04 | GrammaTech, Inc. | Systems and/or methods for automatically protecting against memory corruption vulnerabilities |
US9864649B2 (en) * | 2015-03-27 | 2018-01-09 | Intel Corporation | Technologies for root cause identification of use-after-free memory corruption bugs |
FR3045189B1 (en) * | 2015-12-15 | 2019-12-06 | Ingenico Group | METHOD FOR SECURING AT LEAST ONE MEMORY ZONE OF AN ELECTRONIC DEVICE, SECURITY MODULE, CORRESPONDING ELECTRONIC DEVICE AND COMPUTER PROGRAM |
US10108798B1 (en) * | 2016-01-04 | 2018-10-23 | Smart Information Flow Technologies LLC | Methods and systems for defending against cyber-attacks |
US10198335B2 (en) * | 2016-09-23 | 2019-02-05 | Intel Corporation | Detecting root causes of use-after-free memory errors |
US10345801B2 (en) | 2017-08-21 | 2019-07-09 | Honeywell International Inc. | Ensuring a correct program sequence in a dual-processor architecture |
US11500785B2 (en) * | 2017-09-08 | 2022-11-15 | The Trustees Of Columbia University In The City Of New York | Systems and methods for memory safety with random embedded secret tokens |
US10761970B2 (en) | 2017-10-20 | 2020-09-01 | International Business Machines Corporation | Computerized method and systems for performing deferred safety check operations |
GB2570692B (en) * | 2018-02-02 | 2020-09-09 | Advanced Risc Mach Ltd | Controlling guard tag checking in memory accesses |
US11010495B1 (en) * | 2018-10-23 | 2021-05-18 | Architecture Technology Corporation | Systems and methods for runtime enforcement of data flow integrity |
EP3864545A4 (en) * | 2018-10-29 | 2022-06-15 | Sternum Ltd. | Dynamic memory protection |
CN113412483B (en) * | 2018-12-07 | 2024-05-14 | 皇家飞利浦有限公司 | Computing device with increased resistance to address detection |
RU2724790C1 (en) * | 2018-12-28 | 2020-06-25 | Акционерное общество "Лаборатория Касперского" | System and method of generating log when executing file with vulnerabilities in virtual machine |
US10990427B2 (en) * | 2019-04-03 | 2021-04-27 | Sap Se | Extension application mechanisms through intra-process operation systems |
US11281513B2 (en) * | 2019-06-07 | 2022-03-22 | International Business Machines Corporation | Managing heap metadata corruption |
WO2021034753A2 (en) * | 2019-08-16 | 2021-02-25 | The Regents Of The University Of Michigan | Thwarting control plane attacks with displaced and dilated address spaces |
US11256631B1 (en) * | 2020-01-17 | 2022-02-22 | Ralph Crittenden Moore | Enhanced security via dynamic regions for memory protection units (MPUs) |
US11200158B1 (en) | 2020-06-02 | 2021-12-14 | The Governing Council Of The University Of Toronto | Methods, devices, and media for hardware-supported object metadata retrieval |
US11868238B2 (en) | 2020-06-18 | 2024-01-09 | Samsung Electronics Co., Ltd. | Method and apparatus for fuzz testing based on resource access feedback |
US20220108007A1 (en) * | 2020-10-02 | 2022-04-07 | Vdoo Connected Trust Ltd. | Firmware Protection |
US11947465B2 (en) | 2020-10-13 | 2024-04-02 | International Business Machines Corporation | Buffer overflow trapping |
CN113918371B (en) * | 2021-10-18 | 2023-06-20 | 抖音视界有限公司 | Memory processing method and device |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060174077A1 (en) * | 2005-01-14 | 2006-08-03 | Microsoft Corporation | Software memory access control |
US20080162829A1 (en) * | 2007-01-03 | 2008-07-03 | Freescale Semiconductor, Inc. | Selective guarded memory access on a per-instruction basis |
US20130132690A1 (en) * | 2011-11-21 | 2013-05-23 | Cisco Technology, Inc. | Selective access to executable memory |
US20140082724A1 (en) * | 2012-09-14 | 2014-03-20 | Adrian R. Pearson | Methods and apparatus to protect memory regions during low-power states |
Family Cites Families (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5043870A (en) * | 1982-02-24 | 1991-08-27 | At&T Bell Laboratories | Computer with automatic mapping of memory contents into machine registers during program execution |
US7051056B2 (en) * | 2000-09-13 | 2006-05-23 | Veritas Operating Corporation | Conservative garbage collectors that can be used with general memory allocators |
GB2378778B (en) * | 2001-08-13 | 2005-03-23 | Ibm | Computer system with heap and card table |
US7565509B2 (en) * | 2002-04-17 | 2009-07-21 | Microsoft Corporation | Using limits on address translation to control access to an addressable entity |
US8843605B2 (en) * | 2002-06-03 | 2014-09-23 | Oracle International Corporation | Method and system for filtering and suppression of telemetry data |
US20070128899A1 (en) * | 2003-01-12 | 2007-06-07 | Yaron Mayer | System and method for improving the efficiency, comfort, and/or reliability in Operating Systems, such as for example Windows |
US7890543B2 (en) * | 2003-03-06 | 2011-02-15 | Microsoft Corporation | Architecture for distributed computing system and automated design, deployment, and management of distributed applications |
US7860889B1 (en) * | 2004-05-12 | 2010-12-28 | Cisco Technology, Inc. | Methods and apparatus for redetermining social maps upon expectation of change |
US7735136B2 (en) * | 2005-04-18 | 2010-06-08 | Vmware, Inc. | 0-touch and 1-touch techniques for improving the availability of computer programs under protection without compromising security |
US7478210B2 (en) * | 2006-06-09 | 2009-01-13 | Intel Corporation | Memory reclamation with optimistic concurrency |
US8136091B2 (en) * | 2007-01-31 | 2012-03-13 | Microsoft Corporation | Architectural support for software-based protection |
US8266395B2 (en) * | 2007-03-23 | 2012-09-11 | Vmware, Inc. | Detecting attempts to change memory |
US20090049163A1 (en) * | 2007-08-17 | 2009-02-19 | Matthew Douglas Love | Dynamically typed extensible mib for snmp agents |
US8516450B2 (en) * | 2010-03-19 | 2013-08-20 | Oracle International Corporation | Detecting real-time invalid memory references |
US8762797B2 (en) * | 2011-04-29 | 2014-06-24 | Google Inc. | Method and apparatus for detecting memory access faults |
US20150161385A1 (en) * | 2012-08-10 | 2015-06-11 | Concurix Corporation | Memory Management Parameters Derived from System Modeling |
EP2709017B1 (en) * | 2012-09-14 | 2015-05-27 | Barcelona Supercomputing Center-Centro Nacional de Supercomputación | Device for controlling the access to a cache structure |
JP6239906B2 (en) * | 2012-09-19 | 2017-11-29 | パナソニック インテレクチュアル プロパティ コーポレーション オブ アメリカPanasonic Intellectual Property Corporation of America | ACCESS CONTROL METHOD, ACCESS CONTROL SYSTEM, COMMUNICATION TERMINAL, AND SERVER |
EP3474148B1 (en) * | 2014-07-23 | 2019-12-04 | GrammaTech, Inc. | Systems and/or methods for automatically protecting against memory corruption vulnerabilities |
US10235176B2 (en) * | 2015-12-17 | 2019-03-19 | The Charles Stark Draper Laboratory, Inc. | Techniques for metadata processing |
-
2015
- 2015-07-21 EP EP18212260.6A patent/EP3474148B1/en active Active
- 2015-07-21 WO PCT/US2015/041381 patent/WO2016014567A1/en active Application Filing
- 2015-07-21 US US14/804,911 patent/US9990492B2/en active Active
- 2015-07-21 EP EP15824645.4A patent/EP3195178B1/en not_active Not-in-force
-
2018
- 2018-04-30 US US15/966,604 patent/US10990667B2/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060174077A1 (en) * | 2005-01-14 | 2006-08-03 | Microsoft Corporation | Software memory access control |
US20080162829A1 (en) * | 2007-01-03 | 2008-07-03 | Freescale Semiconductor, Inc. | Selective guarded memory access on a per-instruction basis |
US20130132690A1 (en) * | 2011-11-21 | 2013-05-23 | Cisco Technology, Inc. | Selective access to executable memory |
US20140082724A1 (en) * | 2012-09-14 | 2014-03-20 | Adrian R. Pearson | Methods and apparatus to protect memory regions during low-power states |
Also Published As
Publication number | Publication date |
---|---|
EP3195178A1 (en) | 2017-07-26 |
EP3195178B1 (en) | 2019-02-20 |
EP3474148A1 (en) | 2019-04-24 |
US9990492B2 (en) | 2018-06-05 |
EP3195178A4 (en) | 2018-01-17 |
EP3474148B1 (en) | 2019-12-04 |
US20180247057A1 (en) | 2018-08-30 |
US20160026791A1 (en) | 2016-01-28 |
US10990667B2 (en) | 2021-04-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10990667B2 (en) | Systems and/or methods for automatically protecting against memory corruption vulnerabilities | |
Song et al. | SoK: Sanitizing for security | |
Akritidis et al. | Preventing memory error exploits with WIT | |
US9747172B2 (en) | Selective access to executable memory | |
Chen et al. | StackArmor: Comprehensive Protection From Stack-based Memory Error Vulnerabilities for Binaries. | |
Younan | FreeSentry: protecting against use-after-free vulnerabilities due to dangling pointers. | |
Volckaert et al. | Cloning your gadgets: Complete ROP attack immunity with multi-variant execution | |
Bhatkar et al. | Address obfuscation: An efficient approach to combat a broad range of memory error exploits | |
Younan et al. | PAriCheck: an efficient pointer arithmetic checker for C programs | |
Liu et al. | A robust and efficient defense against use-after-free exploits via concurrent pointer sweeping | |
Petroni Jr et al. | Automated detection of persistent kernel control-flow attacks | |
EP1870829B1 (en) | Securing software by enforcing data flow integrity | |
US8434064B2 (en) | Detecting memory errors using write integrity testing | |
Bojinov et al. | Address space randomization for mobile devices | |
US20150261690A1 (en) | Security in Virtualized Computer Programs | |
US20080016314A1 (en) | Diversity-based security system and method | |
Sarbinowski et al. | VTPin: practical VTable hijacking protection for binaries | |
US20070089088A1 (en) | Dynamically determining a buffer-stack overrun | |
US20140317742A1 (en) | Hypervisor-based buffer overflow detection and prevention | |
Erlingsson et al. | Low-level software security by example | |
CN113987507A (en) | Heap memory vulnerability detection method and device, storage medium and electronic equipment | |
Hohentanner et al. | Cryptsan: Leveraging arm pointer authentication for memory safety in c/c++ | |
Lei et al. | Put your memory in order: Efficient domain-based memory isolation for wasm applications | |
Li et al. | PACSan: Enforcing Memory Safety Based on ARM PA | |
Maar et al. | {SLUBStick}: Arbitrary Memory Writes through Practical Software {Cross-Cache} Attacks within the Linux Kernel |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 15824645 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
REEP | Request for entry into the european phase |
Ref document number: 2015824645 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2015824645 Country of ref document: EP |