MEDS: The Memory Error Detection System

  • Authors:
  • Jason D. Hiser;Clark L. Coleman;Michele Co;Jack W. Davidson

  • Affiliations:
  • Department of Computer Science, University of Virginia, Virginia, U.S.A.;Department of Computer Science, University of Virginia, Virginia, U.S.A.;Department of Computer Science, University of Virginia, Virginia, U.S.A.;Department of Computer Science, University of Virginia, Virginia, U.S.A.

  • Venue:
  • ESSoS '09 Proceedings of the 1st International Symposium on Engineering Secure Software and Systems
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Memory errors continue to be a major source of software failure. To address this issue, we present MEDS (Memory Error Detection System), a system for detecting memory errors within binary executables. The system can detect buffer overflow, uninitialized data reads, double-free, and deallocated memory access errors and vulnerabilities. It works by using static analysis to prove memory accesses safe. If a memory access cannot be proven safe, MEDS falls back to run-time analysis. The system exceeds previous work with dramatic reductions in false positives, as well as covering all memory segments (stack, static, heap).