A Memory Object Sensitive Detecting Method for Use-After-Free Vulnerabilities

2023 2nd International Conference on Artificial Intelligence, Human-Computer Interaction and Robotics (AIHCIR)(2023)

引用 0|浏览0
暂无评分
摘要
The Use-After-Free vulnerability has drawn significant concern recently due to its widespread occurrence and harmful impact on applications, and detecting Use-After-Free and Double Free bugs is a critical challenge in software security. Current detection methods such as AddressSanitizer fail to detect Use-After-Free bugs caused by memory object reoccupation. In this paper, we propose a memory object sensitive detecting method for Use-After-Free vulnerabilities to handle the reoccupation problem. We firstly track the lifetime of memory object through runtime library, and then we construct a novel shadow memory to retain essential diagnosing data. To detect bugs, we label the pointer to the memory object and track the propagation process. Based on that, we implement a tool MOSan. Our experiments on CWE benchmark shows that MOSan could detect all Use-After-Free and Double Free bugs without any false negative, significantly surpassing the effectiveness of Asan.
更多
查看译文
关键词
Software Security,Vulnerability Detection,Use-After-Free
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要