Runtime Verification of C Memory Safety

  • Authors:
  • Grigore Roşu;Wolfram Schulte;Traian Florin Şerbănuţă

  • Affiliations:
  • University of Illinois at Urbana-Champaign,;Microsoft Research,;University of Illinois at Urbana-Champaign,

  • Venue:
  • Runtime Verification
  • Year:
  • 2009

Quantified Score

Hi-index 0.01

Visualization

Abstract

C is the most widely used imperative system's implementation language. While C provides types and high-level abstractions, its design goal has been to provide highest performance which often requires low-level access to memory. As a consequence C supports arbitrary pointer arithmetic, casting, and explicit allocation and deallocation. These operations are difficult to use, resulting in programs that often have software bugs like buffer overflows and dangling pointers that cause security vulnerabilities. We say a C program is memory safe, if at runtime it never goes wrong with such a memory access error. Based on standards for writing "good" C code, this paper proposes strong memory safety as the least restrictive formal definition of memory safety amenable for runtime verification. We show that although verification of memory safety is in general undecidable, even when restricted to closed, terminating programs, runtime verification of strong memory safety is a decision procedure for this class of programs. We verify strong memory safety of a program by executing the program using a symbolic, deterministic definition of the dynamic semantics. A prototype implementation of these ideas shows the feasibility of this approach.