P-TAXI : enforcing memory safety with programmable tagged architecture
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2016.
Main Author: | |
---|---|
Other Authors: | |
Format: | Thesis |
Language: | eng |
Published: |
Massachusetts Institute of Technology
2016
|
Subjects: | |
Online Access: | http://hdl.handle.net/1721.1/105996 |
_version_ | 1826211453225402368 |
---|---|
author | Kamolpornwijit, Witchakorn |
author2 | Howard Shrobe. |
author_facet | Howard Shrobe. Kamolpornwijit, Witchakorn |
author_sort | Kamolpornwijit, Witchakorn |
collection | MIT |
description | Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2016. |
first_indexed | 2024-09-23T15:06:07Z |
format | Thesis |
id | mit-1721.1/105996 |
institution | Massachusetts Institute of Technology |
language | eng |
last_indexed | 2024-09-23T15:06:07Z |
publishDate | 2016 |
publisher | Massachusetts Institute of Technology |
record_format | dspace |
spelling | mit-1721.1/1059962019-04-12T17:17:38Z P-TAXI : enforcing memory safety with programmable tagged architecture Programmable TAXI : enforcing memory safety with programmable tagged architecture Enforcing memory safety with programmable tagged architecture Kamolpornwijit, Witchakorn Howard Shrobe. Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science. Massachusetts Institute of Technology. Department of Electrical Engineering and Computer Science. Electrical Engineering and Computer Science. Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2016. This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections. Cataloged from student-submitted PDF version of thesis. Includes bibliographical references (pages 104-112). Buffer overflow is a well-known problem that remains a threat to software security. With the advancement of code-reuse attacks and return-oriented programming (ROP), it becomes problematic to protect a program from being compromised. Several defenses have been developed in an attempt to defeat code-reuse attacks. However, there is still no solution that provides complete protection with low overhead. In this thesis, we improved TAXI, a ROP defense technique that utilizes a tagged architecture to prevent memory violations. Inspired by Programmable Unit for Metadata Processing (PUMP), we modified TAXI so that enforcement policies can be programmed by user-level code and called it P-TAXI (Programmable TAXI). We demonstrated that, by using P-TAXI, we were able to enforce memory safety policies, including return address protection, stack garbage collection, and memory compartmentalization. In addition, we showed that P-TAXI can be used for debugging and taint tracking. by Witchakorn Kamolpornwijit. M. Eng. 2016-12-22T15:17:55Z 2016-12-22T15:17:55Z 2016 2016 Thesis http://hdl.handle.net/1721.1/105996 965798306 eng M.I.T. theses are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission. See provided URL for inquiries about permission. http://dspace.mit.edu/handle/1721.1/7582 112 pages application/pdf Massachusetts Institute of Technology |
spellingShingle | Electrical Engineering and Computer Science. Kamolpornwijit, Witchakorn P-TAXI : enforcing memory safety with programmable tagged architecture |
title | P-TAXI : enforcing memory safety with programmable tagged architecture |
title_full | P-TAXI : enforcing memory safety with programmable tagged architecture |
title_fullStr | P-TAXI : enforcing memory safety with programmable tagged architecture |
title_full_unstemmed | P-TAXI : enforcing memory safety with programmable tagged architecture |
title_short | P-TAXI : enforcing memory safety with programmable tagged architecture |
title_sort | p taxi enforcing memory safety with programmable tagged architecture |
topic | Electrical Engineering and Computer Science. |
url | http://hdl.handle.net/1721.1/105996 |
work_keys_str_mv | AT kamolpornwijitwitchakorn ptaxienforcingmemorysafetywithprogrammabletaggedarchitecture AT kamolpornwijitwitchakorn programmabletaxienforcingmemorysafetywithprogrammabletaggedarchitecture AT kamolpornwijitwitchakorn enforcingmemorysafetywithprogrammabletaggedarchitecture |