Visible to the public Spatio-temporal Context Reduction: A Pointer-analysis-based Static Approach for Detecting Use-after-free Vulnerabilities

TitleSpatio-temporal Context Reduction: A Pointer-analysis-based Static Approach for Detecting Use-after-free Vulnerabilities
Publication TypeConference Paper
Year of Publication2018
AuthorsYan, Hua, Sui, Yulei, Chen, Shiping, Xue, Jingling
Conference NameProceedings of the 40th International Conference on Software Engineering
Date PublishedMay 2018
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-5638-1
Keywordsbug detection, composability, defense, Metrics, program analysis, pubcrawl, resilience, Resiliency, use-after-free, Zero day attacks
Abstract

Zero-day Use-After-Free (UAF) vulnerabilities are increasingly popular and highly dangerous, but few mitigations exist. We introduce a new pointer-analysis-based static analysis, CRed, for finding UAF bugs in multi-MLOC C source code efficiently and effectively. CRed achieves this by making three advances: (i) a spatio-temporal context reduction technique for scaling down soundly and precisely the exponential number of contexts that would otherwise be considered at a pair of free and use sites, (ii) a multi-stage analysis for filtering out false alarms efficiently, and (iii) a path-sensitive demand-driven approach for finding the points-to information required. We have implemented CRed in LLVM-3.8.0 and compared it with four different state-of-the-art static tools: CBMC (model checking), Clang (abstract interpretation), Coccinelle (pattern matching), and Supa (pointer analysis) using all the C test cases in Juliet Test Suite (JTS) and 10 open-source C applications. For the ground-truth validated with JTS, CRed detects all the 138 known UAF bugs as CBMC and Supa do while Clang and Coccinelle miss some bugs, with no false alarms from any tool. For practicality validated with the 10 applications (totaling 3+ MLOC), CRed reports 132 warnings including 85 bugs in 7.6 hours while the existing tools are either unscalable by terminating within 3 days only for one application (CBMC) or impractical by finding virtually no bugs (Clang and Coccinelle) or issuing an excessive number of false alarms (Supa).

URLhttps://dl.acm.org/doi/10.1145/3180155.3180178
DOI10.1145/3180155.3180178
Citation Keyyan_spatio-temporal_2018