Show simple item record

dc.contributor.advisorMartin Rinard
dc.contributor.authorLong, Fanen_US
dc.contributor.authorSidiroglou-Douskos, Steliosen_US
dc.contributor.authorKim, Deokhwanen_US
dc.contributor.authorRinard, Martinen_US
dc.contributor.otherComputer Architectureen
dc.date.accessioned2013-08-12T02:30:08Z
dc.date.available2013-08-12T02:30:08Z
dc.date.issued2013-08-06
dc.identifier.urihttp://hdl.handle.net/1721.1/79827
dc.description.abstractWe present a system, SIFT, for generating input filters that nullify integer overflow errors associated with critical program sites such as memory allocation or block copy sites. SIFT uses a static program analysis to generate filters that discard inputs that may trigger integer overflow errors in the computations of the sizes of allocated memory blocks or the number of copied bytes in block copy operations. The generated filters are sound if an input passes the filter, it will not trigger an integer overflow error for any analyzed site. Our results show that SIFT successfully analyzes (and therefore generates sound input filters for) 52 out of 58 memory allocation and block memory copy sites in analyzed input processing modules from five applications (VLC, Dillo, Swfdec, Swftools, and GIMP). These nullified errors include six known integer overflow vulnerabilities. Our results also show that applying these filters to 62895 real-world inputs produces no false positives. The analysis and filter generation times are all less than a second.en_US
dc.format.extent20 p.en_US
dc.relation.ispartofseriesMIT-CSAIL-TR-2013-018
dc.subjectStatic Analysisen_US
dc.subjectInteger Overflowen_US
dc.subjectFilter Generationen_US
dc.titleSound Input Filter Generation for Integer Overflow Errorsen_US
dc.date.updated2013-08-12T02:30:08Z


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record