Skip to main content

Explicit Untainting to Reduce Shadow Memory Usage and Access Frequency in Taint Analysis

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 7973))

Abstract

Software vulnerabilities weaken the security of a system increasing possibility of being attacked by exploits in the wild. There are a lot of researches being done on efficiently finding software vulnerabilities to eliminate them. General program testing method for finding flaws in software can be categorized into whitebox and blackbox testing. In whitebox testing, tester examines the internals of the target program such as source codes while in blackbox testing, tester is not aware of the internal structure. Taint analysis is a blackbox testing method efficient for prioritizing exploitable crashes by tracking external input to the program. However due to memory usage and large amount of computation, taint analysis is slow to be used for commercial programs. There has been heuristic approaches to speed up the analysis process but it is not in state of practical use yet. In this paper, we propose a method to reduce resource usage by selectively not tracking certain memories and registers which we call untainting. Our evaluation results show that by untainting we can reduce number of taint operation by considerable amount.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 2011 Annual Report PandaLabs, http://press.pandasecurity.com/press-room/reports

  2. Greenberg, A.: Shopping For Zero-Days: A Price List For Hacker’s Secret Software Exploits (2012), http://www.forbes.com

  3. Vupen Security (February 2013), http://www.vupen.com

  4. Miller, C., et al.: Crash Analysis with Bitblaze In: Blackhat USA (2010)

    Google Scholar 

  5. Schwartz, E.J., Avgerinos, T., Brumley, D.: All You Ever Wanted to Know About Dynamic Taint Analysis and Forward Symbolic Execution (but might have been afraid to ask). In: IEEE Symposium on Security and Privacy (2010)

    Google Scholar 

  6. Brumley, D., Jager, I., Avgerinos, T., Schwartz, E.J.: BAP: A Binary Analysis Platform. In: Gopalakrishnan, G., Qadeer, S. (eds.) CAV 2011. LNCS, vol. 6806, pp. 463–469. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  7. Song, D., Brumley, D., Yin, H., Caballero, J., Jager, I., Kang, M.G., Liang, Z., Newsome, J., Poosankam, P., Saxena, P.: BitBlaze: A New Approach to Computer Security via Binary Analysis. In: Information Systems Security (2008)

    Google Scholar 

  8. Clause, J., Li, W., Orso, A.: Dytan: A Generic Dynamic Taint Analysis Framework. In: Proceedings of the 2007 International Symposium on Software Testing and Analysis. ACM (2007)

    Google Scholar 

  9. Avgerinos, T., Cha, S.K., Hao, B.L.T., Brumley, D.: AEG: Automatic Exploit Generation In. In: Proceedings of the Network and Distributed System Security Symposium (2011)

    Google Scholar 

  10. Miller, C., et al.: Crash Analysis with Bitblaze In: Blackhat USA (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Min, JW., Choi, YH., Eom, JH., Chung, TM. (2013). Explicit Untainting to Reduce Shadow Memory Usage and Access Frequency in Taint Analysis. In: Murgante, B., et al. Computational Science and Its Applications – ICCSA 2013. ICCSA 2013. Lecture Notes in Computer Science, vol 7973. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-39646-5_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-39646-5_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-39645-8

  • Online ISBN: 978-3-642-39646-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics