Practical automated vulnerability monitoring using program state invariants

  • Authors:
  • Cristiano Giuffrida;Lorenzo Cavallaro;Andrew S. Tanenbaum

  • Affiliations:
  • Vrije Universiteit Amsterdam, The Netherlands;Royal Holloway, University of London, UK;Vrije Universiteit Amsterdam, The Netherlands

  • Venue:
  • DSN '13 Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
  • Year:
  • 2013

Quantified Score

Hi-index 0.00

Visualization

Abstract

Despite the growing attention to security concerns and advances in code verification tools, many memory errors still escape testing and plague production applications with security vulnerabilities. We present RCORE, an efficient dynamic program monitoring infrastructure to perform automated security vulnerability monitoring. Our approach is to perform extensive static analysis at compile time to automatically index program state invariants (PSIs). At runtime, our novel dynamic analysis continuously inspects the program state and produces a report when PSI violations are found. Our technique retrofits existing applications and is designed for both offline and production runs. To avoid slowing down production applications, we can perform our dynamic analysis on idle cores to detect suspicious behavior in the background. The alerts raised by our analysis are symptoms of memory corruption or other—potentially exploitable—dangerous behavior. Our experimental evaluation confirms that RCORE can report on several classes of vulnerabilities with very low overhead.