Title
Smov: Array Bound-Check And Access In A Single Instruction
Abstract
A Buffer Overflow (BOF) continues to be among the top open doors to worms and malware. Earlier in 2014, the security world was taken by surprise when researches unveiled a BOF in OpenSSL. Languages like C and C++, widely used for system development and for a large variety of applications, do not provide native Array-Bound Checks (ABC). A myriad of proposals endeavor memory protection for such languages by employing both software-and hardware-based solutions. Due to numerous reasons, none of them have yet reached the mainstream. In this work we propose a novel approach to achieve an array bound-check and a memory access (when allowed) within a single instruction. We discuss how it can be implemented on variable-length ISAs and provide a reference implementation. Our results indicate that our solution can run programs 1,79x faster than the software-based approach.
Year
Venue
Field
2016
2016 13TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC)
Memory protection,Computer science,Reference implementation,Software,System development,Surprise,Malware,Operating system,Buffer overflow,Doors
DocType
Citations 
PageRank 
Conference
0
0.34
References 
Authors
22
5
Name
Order
Citations
PageRank
Antonio Maia100.34
Leandro Melo211.03
Fernando Magno Quintão Pereira321620.03
Omar P. Vilela Neto45811.12
Leonardo B. Oliveira555430.22