Abstract
Software vulnerabilities weaken the security of a system increasing possibility of being attacked by exploits in the wild. There are a lot of researches being done on efficiently finding software vulnerabilities to eliminate them. General program testing method for finding flaws in software can be categorized into whitebox and blackbox testing. In whitebox testing, tester examines the internals of the target program such as source codes while in blackbox testing, tester is not aware of the internal structure. Taint analysis is a blackbox testing method efficient for prioritizing exploitable crashes by tracking external input to the program. However due to memory usage and large amount of computation, taint analysis is slow to be used for commercial programs. There has been heuristic approaches to speed up the analysis process but it is not in state of practical use yet. In this paper, we propose a method to reduce resource usage by selectively not tracking certain memories and registers which we call untainting. Our evaluation results show that by untainting we can reduce number of taint operation by considerable amount.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
2011 Annual Report PandaLabs, http://press.pandasecurity.com/press-room/reports
Greenberg, A.: Shopping For Zero-Days: A Price List For Hacker’s Secret Software Exploits (2012), http://www.forbes.com
Vupen Security (February 2013), http://www.vupen.com
Miller, C., et al.: Crash Analysis with Bitblaze In: Blackhat USA (2010)
Schwartz, E.J., Avgerinos, T., Brumley, D.: All You Ever Wanted to Know About Dynamic Taint Analysis and Forward Symbolic Execution (but might have been afraid to ask). In: IEEE Symposium on Security and Privacy (2010)
Brumley, D., Jager, I., Avgerinos, T., Schwartz, E.J.: BAP: A Binary Analysis Platform. In: Gopalakrishnan, G., Qadeer, S. (eds.) CAV 2011. LNCS, vol. 6806, pp. 463–469. Springer, Heidelberg (2011)
Song, D., Brumley, D., Yin, H., Caballero, J., Jager, I., Kang, M.G., Liang, Z., Newsome, J., Poosankam, P., Saxena, P.: BitBlaze: A New Approach to Computer Security via Binary Analysis. In: Information Systems Security (2008)
Clause, J., Li, W., Orso, A.: Dytan: A Generic Dynamic Taint Analysis Framework. In: Proceedings of the 2007 International Symposium on Software Testing and Analysis. ACM (2007)
Avgerinos, T., Cha, S.K., Hao, B.L.T., Brumley, D.: AEG: Automatic Exploit Generation In. In: Proceedings of the Network and Distributed System Security Symposium (2011)
Miller, C., et al.: Crash Analysis with Bitblaze In: Blackhat USA (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Min, JW., Choi, YH., Eom, JH., Chung, TM. (2013). Explicit Untainting to Reduce Shadow Memory Usage and Access Frequency in Taint Analysis. In: Murgante, B., et al. Computational Science and Its Applications – ICCSA 2013. ICCSA 2013. Lecture Notes in Computer Science, vol 7973. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-39646-5_13
Download citation
DOI: https://doi.org/10.1007/978-3-642-39646-5_13
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-39645-8
Online ISBN: 978-3-642-39646-5
eBook Packages: Computer ScienceComputer Science (R0)