Title
DieHarder: securing the heap
Abstract
Heap-based attacks depend on a combination of memory management error and an exploitable memory allocator. Many allocators include ad hoc countermeasures against particular exploits but their effectiveness against future exploits has been uncertain. This paper presents the first formal treatment of the impact of allocator design on security. It analyzes a range of widely-deployed memory allocators, including those used by Windows, Linux, FreeBSD and OpenBSD, and shows that they remain vulnerable to attack. It them presents DieHarder, a new allocator whose design was guided by this analysis. DieHarder provides the highest degree of security from heap-based attacks of any practical allocator of which we are aware while imposing modest performance overhead. In particular, the Firefox web browser runs as fast with DieHarder as with the Linux allocator.
Year
DOI
Venue
2011
10.1145/1866307.1866371
WOOT
Keywords
Field
DocType
dynamic memory allocation,practical allocator,buffer overflow,exploitable memory allocator,memory management error,dangling pointer,memory errors,firefox web browser,linux allocator,new allocator,widely-deployed memory allocators,particular exploit,heap-based attack,allocator design,memory management,memory allocation
C dynamic memory allocation,Computer security,Computer science,Heap overflow,Heap (data structure),Memory management,Dangling pointer,Allocator,Operating system,Memory errors,Buffer overflow
Conference
Citations 
PageRank 
References 
42
1.72
14
Authors
2
Name
Order
Citations
PageRank
Gene Novark1492.49
Emery D. Berger2104855.87