Formal reasoning of various categories of widely exploited security vulnerabilities using pointer taintedness semantics

Shuo Chen, Karthik Pattabiraman, Zbigniew Kalbarczyk, Ravi K. Iyer

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

This paper is motivated by a low level analysis of various categories of severe security vulnerabilities, which indicates that a common characteristic of many c1asses of vulnerabilities is pointer taintedness. Apointer is said to be tainted if a user input can directly or indirectly be used as apointer value. In order to reason about pointer taintedness, a memory model is needed. The main contribution of this paper is the formal definition of a memory model using equational logic, which is used to reason about pointer taintedness. The reasoning is applied to several Iibrary fimctions to extract security preconditions, which must be satisfied to eliminate the possibility of pointer taintedness. The results show that pointer taintedness analysis can expose different c1asses of security vulnerabilities, such as format string, heap corruption and buffer overflow vulnerabilities, leading us to believe that pointer taintedness provides a unifying perspective for reasoning about security vulnerabilities.

Original languageEnglish (US)
Title of host publicationSecurity and Protection in Information Processing systems - IFIP 18th World Computer Congress, TC11 19th International Information Security Conference, SEC 2004
PublisherSpringer
Pages83-99
Number of pages17
ISBN (Print)9781475780161
DOIs
StatePublished - 2004
EventIFIP TC11 19th International Information Security Conference, SEC 2004 - Toulouse, France
Duration: Aug 22 2004Aug 27 2004

Publication series

NameIFIP Advances in Information and Communication Technology
Volume147
ISSN (Print)1868-4238

Other

OtherIFIP TC11 19th International Information Security Conference, SEC 2004
Country/TerritoryFrance
CityToulouse
Period8/22/048/27/04

Keywords

  • Equational logic
  • Pointer taintedness
  • Program semanties
  • Security vulnerability
  • Static analysis

ASJC Scopus subject areas

  • Information Systems and Management

Fingerprint

Dive into the research topics of 'Formal reasoning of various categories of widely exploited security vulnerabilities using pointer taintedness semantics'. Together they form a unique fingerprint.

Cite this