• Title/Summary/Keyword: Dangling Pointer

Search Result 3, Processing Time 0.018 seconds

Deduplication and Exploitability Determination of UAF Vulnerability Samples by Fast Clustering

  • Peng, Jianshan;Zhang, Mi;Wang, Qingxian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.10
    • /
    • pp.4933-4956
    • /
    • 2016
  • Use-After-Free (UAF) is a common lethal form of software vulnerability. By using tools such as Web Browser Fuzzing, a large amount of samples containing UAF vulnerabilities can be generated. To evaluate the threat level of vulnerability or to patch the vulnerabilities, automatic deduplication and exploitability determination should be carried out for these samples. There are some problems existing in current methods, including inadequate pertinence, lack of depth and precision of analysis, high time cost, and low accuracy. In this paper, in terms of key dangling pointer and crash context, we analyze four properties of similar samples of UAF vulnerability, explore the method of extracting and calculate clustering eigenvalues from these samples, perform clustering by fast search and find of density peaks on a large number of vulnerability samples. Samples were divided into different UAF vulnerability categories according to the clustering results, and the exploitability of these UAF vulnerabilities was determined by observing the shape of class cluster. Experimental results showed that the approach was applicable to the deduplication and exploitability determination of a large amount of UAF vulnerability samples, with high accuracy and low performance cost.

A Study on the Remove Use-After-Free Security Weakness (소프트웨어 개발단계 Use-After-Free 보안약점 제거방안 연구)

  • Park, Yong Koo;Choi, Jin Young
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.1
    • /
    • pp.43-50
    • /
    • 2017
  • Use-After-Free security problem is rapidly growing in popularity, especially for attacking web browser, operating system kernel, local software. This security weakness is difficult to detect by conventional methods. And if local system or software has this security weakness, it cause internal security problem. In this paper, we study ways to remove this security weakness in software development by summarize the cause of the Use-After-Free security weakness and suggest ways to remove them.

A Study on Effective Garbage Collection using Memory Partitioning (메모리 분할을 이용한 효과적인 가비지 컬렉션에 관한 연구)

  • Heo, Seo-Kyung;Lee, Sung-Young
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.11a
    • /
    • pp.317-320
    • /
    • 2003
  • 자바는 플랫폼 독립성, 이식성, 보안, 멀티 쓰레드 지원, 동적 적재, 자동화된 메모리 관리(Garbage Collection) 등 많은 장점을 갖는 언어이다. 특히, 가비지 컬렉터(Garbage Collector)는 메모리 누수(memory leak), 동강난 포인터(dangling pointer) 등과 같은 메모리의 잘못된 사용으로 인한 버그로부터 프로그래머를 자유롭게 하며, 디버깅의 용이함, 개발비용의 절감, 프로그램의 일관성 및 견고성의 향상 등의 이점을 얻을 수 있다. 그러나, 자바 가상머신(Java Virtual Machine)에서 가비지 컬렉터가 객체를 추적(tracing)하고 수집(collecting)하는 작업은 프로그램의 수행 성능을 저하시키는 요인이 된다. 따라서, 본 논문에서는 가비지 컬렉터의 성능을 향상시키기 위하여 힙(heap)에 할당하는 객체들의 특성을 고려하여 메모리를 분할한 후, 효율적으로 컬렉션 작업을 수행 할 수 있는 기법을 소개한다.

  • PDF