Filters








13 Hits in 3.1 sec

SafeMem: Exploiting ECC-Memory for Detecting Memory Leaks and Memory Corruption During Production Runs

Feng Qin, Shan Lu, Yuanyuan Zhou
11th International Symposium on High-Performance Computer Architecture  
This paper proposes a tool called SafeMem to detect memory leaks and memory corruption on-the-fly during production-runs. This tool does not rely on any new hardware support.  ...  Instead, it makes a novel use of existing ECC memory technology and exploits intelligent dynamic memory usage behavior analysis to detect memory leaks and corruption.  ...  Acknowledgments The authors would like to thank the anonymous reviewers for their invaluable feedback. We also thank Sanjeev Kumar (Intel) for useful information on ECC chipsets.  ... 
doi:10.1109/hpca.2005.29 dblp:conf/hpca/QinLZ05 fatcat:usehrseakbhv3lhvxwovpmjrz4

AHEMS: Asynchronous Hardware-Enforced Memory Safety

Kuan-Yu Tseng, Dao Lu, Zbigniew Kalbarczyk, Ravishankar Iyer
2014 2014 17th Euromicro Conference on Digital System Design  
This paper presents AHEMS (Asynchronous Hardware-Enforced Memory Safety), an architectural support for enforcing spatial and temporal memory safety to protect against memory corruption attacks.  ...  In an evaluation of the detection coverage using 677 security test cases (including spatial and temporal memory errors), selected from the Juliet Test Suite, AHEMS detected all but one memory safety violation  ...  Hardware Approaches SafeMem [18] utilizes the ECC bits existing in memory to detect memory leaks and some classes of memory errors.  ... 
doi:10.1109/dsd.2014.79 dblp:conf/dsd/TsengLKI14 fatcat:uagx7bgpw5fylafzdkun4vdwia

Bell

Michael D. Bond, Kathryn S. McKinley
2006 Proceedings of the 12th international conference on Architectural support for programming languages and operating systems - ASPLOS-XII  
Online leak detection tools benefit from storing and reporting per-object sites (e.g., allocation sites) for potentially leaking objects.  ...  Memory leaks compromise availability and security by crippling performance and crashing programs. Leaks are difficult to diagnose because they have no immediate symptoms.  ...  SafeMem SafeMem employs a novel use of error-correcting code (ECC) memory to monitor memory accesses in C programs, in order to find leaks and catch some types of memory corruption [26] .  ... 
doi:10.1145/1168857.1168866 dblp:conf/asplos/BondM06 fatcat:fewfefcwqbglxbypeyoynttq4a

Bell

Michael D. Bond, Kathryn S. McKinley
2006 SIGARCH Computer Architecture News  
Online leak detection tools benefit from storing and reporting per-object sites (e.g., allocation sites) for potentially leaking objects.  ...  Memory leaks compromise availability and security by crippling performance and crashing programs. Leaks are difficult to diagnose because they have no immediate symptoms.  ...  SafeMem SafeMem employs a novel use of error-correcting code (ECC) memory to monitor memory accesses in C programs, in order to find leaks and catch some types of memory corruption [26] .  ... 
doi:10.1145/1168919.1168866 fatcat:uatnwgyn4rbwxdta3uljtzbu2i

Bell

Michael D. Bond, Kathryn S. McKinley
2006 ACM SIGOPS Operating Systems Review  
Online leak detection tools benefit from storing and reporting per-object sites (e.g., allocation sites) for potentially leaking objects.  ...  Memory leaks compromise availability and security by crippling performance and crashing programs. Leaks are difficult to diagnose because they have no immediate symptoms.  ...  SafeMem SafeMem employs a novel use of error-correcting code (ECC) memory to monitor memory accesses in C programs, in order to find leaks and catch some types of memory corruption [26] .  ... 
doi:10.1145/1168917.1168866 fatcat:qpkoyg4tpva75gkxrkogxrl6wi

Bell

Michael D. Bond, Kathryn S. McKinley
2006 SIGPLAN notices  
Online leak detection tools benefit from storing and reporting per-object sites (e.g., allocation sites) for potentially leaking objects.  ...  Memory leaks compromise availability and security by crippling performance and crashing programs. Leaks are difficult to diagnose because they have no immediate symptoms.  ...  SafeMem SafeMem employs a novel use of error-correcting code (ECC) memory to monitor memory accesses in C programs, in order to find leaks and catch some types of memory corruption [26] .  ... 
doi:10.1145/1168918.1168866 fatcat:xsmlh33trbbmzdgj3gngqofzzm

Dynamically validating static memory leak warnings

Mengchen Li, Yuanjun Chen, Linzhang Wang, Guoqing Xu
2013 Proceedings of the 2013 International Symposium on Software Testing and Analysis - ISSTA 2013  
Memory leaks have significant impact on software availability, performance, and security. Static analysis has been widely used to find memory leaks in C/C++ programs.  ...  In this paper, we develop a novel dynamic technique that automatically validates and categorizes such warnings to unleash the power of static memory leak detectors.  ...  SafeMem is a low-overhead technique that detects memory leaks and memory corruption on-the-fly by exploiting the ECC memory.  ... 
doi:10.1145/2483760.2483778 dblp:conf/issta/LiCWX13 fatcat:7an3quzwp5b35j3eey3uwlazva

Profile-guided proactive garbage collection for locality optimization

Wen-ke Chen, Sanjay Bhansali, Trishul Chilimbi, Xiaofeng Gao, Weihaw Chuang
2006 SIGPLAN notices  
The goal of our research is to develop hardware support for software checks and for multi-threaded synchronization that protects memory from corruption.  ...  We want efficient low-overhead run-time performance of these checks and synchronization so that it can be left on all of the time, even in production code releases.  ...  SafeMem [70] alters ECC to provide watched memory boundaries for detecting buffer overflows and to identify infrequently accessed objects for memory leak detection.  ... 
doi:10.1145/1133255.1134021 fatcat:rdddng3bj5fdfprxfg6ut3dg3y

Profile-guided proactive garbage collection for locality optimization

Wen-ke Chen, Sanjay Bhansali, Trishul Chilimbi, Xiaofeng Gao, Weihaw Chuang
2006 Proceedings of the 2006 ACM SIGPLAN conference on Programming language design and implementation - PLDI '06  
The goal of our research is to develop hardware support for software checks and for multi-threaded synchronization that protects memory from corruption.  ...  We want efficient low-overhead run-time performance of these checks and synchronization so that it can be left on all of the time, even in production code releases.  ...  SafeMem [70] alters ECC to provide watched memory boundaries for detecting buffer overflows and to identify infrequently accessed objects for memory leak detection.  ... 
doi:10.1145/1133981.1134021 dblp:conf/pldi/ChenBCGC06 fatcat:bnv6i26dnfaj3fel6vudd2ut3u

MemTracker

Guru Venkataramani, Ioannis Doudalis, Yan Solihin, Milos Prvulovic
2009 ACM Transactions on Architecture and Code Optimization (TACO)  
Such low overheads allow continuous (always-on) use of MemTracker-enabled checkers, even in production runs.  ...  Existing software and hardware approaches for finding and identifying memory bugs have a number of drawbacks including considerable performance overheads, target only a specific type of bug, implementation  ...  too high to allow always-on checking in production runs.  ... 
doi:10.1145/1543753.1543754 fatcat:n3xdhxjnlbetrgoj5jf7izywve

Bespoke Security for Resource Constrained Cyber-Physical Systems

Miguel Angel Arroyo
2020
We discuss available security primitives and their limitations for both hardware and software. In particular, we focus on software security threats targeting memory safety.  ...  Autonomous cars, life saving medical devices, drones for package delivery, and robots for manufacturing are all prime examples of CPSs.  ...  SafeMem [236] 2x blacklisted memory ∝ ∼ Blacklisted memory ∝ ∼ # of ECC (un)set ops Syscall to scramble ECC, copy data content.  ... 
doi:10.7916/d8-cgaj-mz52 fatcat:oagan66zandbtn65x2gsacmmtu

Repurposing Software Defenses with Specialized Hardware

Kanad Sinha
2019
As such, it marries the collective concerns of not only users and software developers, who demand performant but secure products, but also that of hardware vendors, since implementation simplicity directly  ...  Computer security has largely been the domain of software for the last few decades.  ...  Many are to blame for getting me past the finish line. Needless to say, the biggest credit goes to my advisor, Simha. Beyond the wealth of know-  ... 
doi:10.7916/d8-e6tc-kr63 fatcat:5mmez4ypdzfqffukip6xzaotve

Architectural Support to Accelerate Fine-Grain Program Monitoring

Sotiria Fytraki
2014
leaks and memory corruptions.  ...  ., potential memory leaks). SafeMem employs ECC to further monitor the suspect objects, so as to prune false positives.  ... 
doi:10.5075/epfl-thesis-6257 fatcat:mkvqgcbs3zaqnhqd6p66fkhpky