Publications

Detailed Information

Enhancing Memory Error Detection for Large-Scale Applications and Fuzz Testing

DC Field Value Language
dc.contributor.authorJoe, Byunggill-
dc.contributor.authorHan, Wookhyun-
dc.contributor.authorLee, Byoungyoung-
dc.contributor.authorSong, Chengyu-
dc.contributor.authorShin, Insik-
dc.date.accessioned2023-07-27T07:38:56Z-
dc.date.available2023-07-27T07:38:56Z-
dc.date.created2023-07-26-
dc.date.created2023-07-26-
dc.date.issued2018-02-
dc.identifier.citation25TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2018)-
dc.identifier.urihttps://hdl.handle.net/10371/195311-
dc.description.abstractMemory errors are one of the most common vulnerabilities for the popularity of memory unsafe languages including C and C++. Once exploited, it can easily lead to system crash (i.e., denial-of-service attacks) or allow adversaries to fully compromise the victim system. This paper proposes MEDS, a practical memory error detector. MEDS significantly enhances its detection capability by approximating two ideal properties, called an infinite gap and an infinite heap. The approximated infinite gap of MEDS setups large inaccessible memory region between objects (i.e., 4 MB), and the approximated infinite heap allows MEDS to fully utilize virtual address space (i.e., 45-bits memory space). The key idea of MEDS in achieving these properties is a novel user-space memory allocation mechanism, MEDSALLOC. MEDSALLOC leverages a page aliasing mechanism, which allows MEDS to maximize the virtual memory space utilization but minimize the physical memory uses. To highlight the detection capability and practical impacts of MEDS, we evaluated and then compared to Google's state-of-the-art detection tool, AddressSanitizer. MEDS showed three times better detection rates on four real-world vulnerabilities in Chrome and Firefox. More importantly, when used for a fuzz testing, MEDS was able to identify 68.3% more memory errors than AddressSanitizer for the same amount of a testing time, highlighting its practical aspects in the software testing area. In terms of performance overhead, MEDS slowed down 108% and 86% compared to native execution and AddressSanitizer, respectively, on real-world applications including Chrome, Firefox, Apache, Nginx, and OpenSSL.-
dc.language영어-
dc.publisherINTERNET SOC-
dc.titleEnhancing Memory Error Detection for Large-Scale Applications and Fuzz Testing-
dc.typeArticle-
dc.identifier.doi10.14722/ndss.2018.23312-
dc.citation.journaltitle25TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2018)-
dc.identifier.wosid000722005800039-
dc.identifier.scopusid2-s2.0-85056852324-
dc.description.isOpenAccessY-
dc.contributor.affiliatedAuthorLee, Byoungyoung-
dc.type.docTypeProceedings Paper-
dc.description.journalClass1-
Appears in Collections:
Files in This Item:
There are no files associated with this item.

Altmetrics

Item View & Download Count

  • mendeley

Items in S-Space are protected by copyright, with all rights reserved, unless otherwise indicated.

Share