Á¤º¸°úÇÐȸ ÄÄÇ»ÆÃÀÇ ½ÇÁ¦ ³í¹®Áö (KIISE Transactions on Computing Practices)
Current Result Document :
ÇѱÛÁ¦¸ñ(Korean Title) |
¹öÆÛ ¿À¹öÇÃ·Î¿ì µð¹ö±ë Ç÷§ÆûÀÇ ¸Þ¸ð¸® ¿À¹öÇìµå ºÐ¼® |
¿µ¹®Á¦¸ñ(English Title) |
Analysis of Memory Overhead for Buffer Overflow Debugging Platform |
ÀúÀÚ(Author) |
ÃÖ¿µÈ£
±ÇÀç¿í
Á¤¼®Àç
¹ÚÇѼ·
¾ö¿µÀÍ
Youngho Choi
Jaeook Kwon
Seokjae Jeong
Hansub Park
Young Ik Eom
|
¿ø¹®¼ö·Ïó(Citation) |
VOL 25 NO. 07 PP. 0363 ~ 0368 (2019. 07) |
Çѱ۳»¿ë (Korean Abstract) |
ÃÖ±Ù, ½º¸¶Æ®TV, ½º¸¶Æ®Æù°ú °°Àº ½º¸¶Æ® ÀåÄ¡ÀÇ ¼ÒÇÁÆ®¿þ¾î º¹Àâµµ°¡ Áõ°¡ÇÏ¸é¼ ¹öÆÛ ¿À¹öÇ÷οì Ãë¾àÁ¡ÀÌ ¹ß°ßµÇ´Â »ç·Ê°¡ Áõ°¡ÇÏ°í ÀÖ´Ù. ¹ü¿ë Çϵå¿þ¾î¿¡¼ ÀϹÝÀûÀ¸·Î Áö¿øÇÏ´Â º¸È£µÈ ¸Þ¸ð¸® ÆäÀÌÁö ±â¹ÝÀÇ ¹öÆÛ ¿À¹öÇÃ·Î¿ì °Ë»ç µµ±¸´Â ½º¸¶Æ® ÀåÄ¡ÀÇ ¼ÒÇÁÆ®¿þ¾î¸¦ °Ë»çÇϱ⿡ À¯¿ëÇÏÁö¸¸ ÆäÀÌÁö ´ÜÀ§ÀÇ ¸Þ¸ð¸®¸¦ ÇÒ´çÇÏ¿© °Ë»ç¿¡ »ç¿ëÇϱ⠶§¹®¿¡ ¸Þ¸ð¸® »ç¿ë·®ÀÌ Å©°Ô Áõ°¡ÇÑ´Ù. º» ³í¹®¿¡¼´Â º¸È£µÈ ¸Þ¸ð¸® ÆäÀÌÁö ±â¹ÝÀÇ ¹öÆÛ ¿À¹öÇÃ·Î¿ì °Ë»ç µµ±¸¿¡¼ ÇÒ´çÇÑ ¸Þ¸ð¸®°¡ ½º¿ÍÇÎ µÈ´Ù´Â Á¡À» ÀÌ¿ëÇÏ¿© ¸Þ¸ð¸® »ç¿ë·®À» ÁÙÀÏ ¼ö ÀÖ´Â »õ·Î¿î º¸È£µÈ ¸Þ¸ð¸® ÆäÀÌÁö ±â¹Ý µð¹ö±ë Ç÷§ÆûÀ» Á¦¾ÈÇÑ´Ù. Á¦¾È ±â¹ýÀ» ½ÇÁ¦ µð¹ö±ë ¶óÀ̺귯¸®¿Í ¸®´ª½º Ä¿³Î¿¡ ±¸ÇöÇÏ¿© ±âÁ¸ ±â¼ú°ú ¸Þ¸ð¸® »ç¿ë·®À» ºñ±³ÇÏ¿´À¸¸ç, ±âÁ¸ ±â¹ý ´ëºñ ¸Þ¸ð¸® »ç¿ë·®ÀÌ Æò±Õ 35% °¨¼ÒÇÔÀ» È®ÀÎÇÏ¿´´Ù.
|
¿µ¹®³»¿ë (English Abstract) |
In recent years, as software complexity of smart devices such as smart TVs and smartphones has increased, buffer overflow vulnerabilities have also increased. Protected memory page-based buffer overflow detecting tool, mostly supported on general purpose hardware platforms, is valuable for verifying the software on smart devices. However, memory usage is greatly increased by using page granularity memory allocation. In this paper, we revisit the traditional buffer overflow debugging approach, and propose a novel buffer overflow debugging platform by modifying the debugging library and memory swapping scheme. For the evaluation of the platform, we implemented a prototype of our debugging platform on debugging library and Linux kernel and conducted various experiments. Our experimental results show that the proposed scheme reduces memory usage by 35% on average.
|
Å°¿öµå(Keyword) |
¹öÆÛ ¿À¹öÇ÷οì
¸Þ¸ð¸® ¿¡·¯
¾ÐÃà ¸Þ¸ð¸® ½º¿ÍÇÎ
¿î¿µÃ¼Á¦
¹öÆÛ ¿À¹öÇÃ·Î¿ì °Ë»ç µµ±¸
duma(detected unintended memory access)
zram
memory error
compressed memory swapping
operating systems
buffer overflow detection tool
duma(detected unintended memory access)
zram
|
ÆÄÀÏ÷ºÎ |
PDF ´Ù¿î·Îµå
|