SecretSafe: A Lightweight Approach against Heap Buffer Over-Read Attack

Xiaoguang Wang, Yong Qi, Chi Zhang, Saiyu Qi, Peijian Wang
{"title":"SecretSafe: A Lightweight Approach against Heap Buffer Over-Read Attack","authors":"Xiaoguang Wang, Yong Qi, Chi Zhang, Saiyu Qi, Peijian Wang","doi":"10.1109/COMPSAC.2017.206","DOIUrl":null,"url":null,"abstract":"Software memory disclosure attacks, such as buffer over-read, often work quietly and would cause secret data leakage. The well-known OpenSSL Heartbleed vulnerability leaked out millions of servers’ private keys, which caused most of the Internet services insecure at that time. Existing solutions are either hard to apply to large code bases (e.g., through formal verification [20] or symbolic execution [8] on program code), or too heavyweight (e.g., by involving a hypervisor software [23], [24] or a modified operating system kernel [17]). In this paper, we propose SecretSafe, a lightweight and easy-to-use system which leverages the traditional x86 segmentation mechanism to isolate the application secrets from the remaining data. Software developers could prevent the secrets from being leaked out by simply declaring the secret variables with SECURE keyword. Our customized compiler will automatically separate the secrets from the remaining non-secret data with an isolated memory segment. Any legal instructions that have to access the secrets will be automatically instrumented to enable accesses to the isolated segment. We have implemented a SecretSafe prototype with the open source LLVM compiler framework. The evaluation shows that SecretSafe is both secure and efficient.","PeriodicalId":6556,"journal":{"name":"2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)","volume":"5 1","pages":"628-636"},"PeriodicalIF":0.0000,"publicationDate":"2017-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/COMPSAC.2017.206","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

Software memory disclosure attacks, such as buffer over-read, often work quietly and would cause secret data leakage. The well-known OpenSSL Heartbleed vulnerability leaked out millions of servers’ private keys, which caused most of the Internet services insecure at that time. Existing solutions are either hard to apply to large code bases (e.g., through formal verification [20] or symbolic execution [8] on program code), or too heavyweight (e.g., by involving a hypervisor software [23], [24] or a modified operating system kernel [17]). In this paper, we propose SecretSafe, a lightweight and easy-to-use system which leverages the traditional x86 segmentation mechanism to isolate the application secrets from the remaining data. Software developers could prevent the secrets from being leaked out by simply declaring the secret variables with SECURE keyword. Our customized compiler will automatically separate the secrets from the remaining non-secret data with an isolated memory segment. Any legal instructions that have to access the secrets will be automatically instrumented to enable accesses to the isolated segment. We have implemented a SecretSafe prototype with the open source LLVM compiler framework. The evaluation shows that SecretSafe is both secure and efficient.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
SecretSafe:一个轻量级的方法来对付堆缓冲区过读攻击
软件内存泄露攻击(例如缓冲区过读)通常悄无声息地进行,并可能导致机密数据泄露。众所周知的OpenSSL“心脏出血”漏洞泄露了数百万服务器的私钥,导致当时大多数互联网服务不安全。现有的解决方案要么难以应用于大型代码库(例如,通过形式验证[20]或对程序代码进行符号执行[8]),要么过于重量级(例如,通过涉及管理程序软件[23],[24]或修改的操作系统内核[17])。在本文中,我们提出了SecretSafe,一个轻量级且易于使用的系统,它利用传统的x86分段机制将应用程序的秘密与剩余数据隔离开来。软件开发人员可以通过简单地使用SECURE关键字声明秘密变量来防止秘密泄露。我们定制的编译器会自动将机密数据与剩余的非机密数据用隔离的内存段分开。任何必须访问机密的法律指令都将被自动检测,以允许访问隔离的部分。我们用开源的LLVM编译器框架实现了一个SecretSafe原型。评价结果表明,SecretSafe既安全又高效。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Physical Attestation in the Smart Grid for Distributed State Verification Corroboration Effect of Current Net Earnings and Management’s Net Earnings Forecasts in Japan’s Corporate Bond Market Message from the CAP 2017 Organizing Committee Combinations of Personal Characteristic Types and Learning Effectiveness of Teams Detecting and Classifying Android PUAs by Similarity of DNS queries
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1