FormatShield: A Binary Rewriting Defense against Format String Attacks

  • Authors:
  • Pankaj Kohli;Bezawada Bruhadeshwar

  • Affiliations:
  • Centre for Security, Theory and Algorithmic Research (C-STAR), International Institute of Information Technology, Hyderabad, India 500032;Centre for Security, Theory and Algorithmic Research (C-STAR), International Institute of Information Technology, Hyderabad, India 500032

  • Venue:
  • ACISP '08 Proceedings of the 13th Australasian conference on Information Security and Privacy
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

Format string attacks allow an attacker to read or write anywhere in the memory of a process. Previous solutions designed to detect format string attacks either require source code and recompilation of the program, or aim to defend only against write attempts to security critical control information. They do not protect against arbitrary memory read attempts and non-control data attacks. This paper presents FormatShield, a comprehensive defense against format string attacks. FormatShield identifies potentially vulnerable call sites in a running process and dumps the corresponding context information in the program binary. Attacks are detected when malicious input is found at vulnerable call sites with an exploitable context. It does not require source code or recompilation of the program and can defend against arbitrary memory read and write attempts, including non-control data attacks. Also, our experiments show that FormatShield incurs minimal performance overheads and is better than existing solutions.