Skip to main content
European Commission logo
italiano italiano
CORDIS - Risultati della ricerca dell’UE
CORDIS

Code Sanitization for Vulnerability Pruning and Exploitation Mitigation

Descrizione del progetto

Rimozione di dati dannosi per proteggere il software

I software dei sistemi devono avere una protezione efficace e notevoli sforzi sono stati fatti per trovare una soluzione. Tuttavia, si stima che ogni mese vengano rilevati circa 60 bug di sicurezza. Questo perché il software dei sistemi è vulnerabile ai bug di basso livello dovuti a comportamenti indefiniti. Il progetto CodeSan, finanziato dall’UE, propone un metodo inclusivo che migliora la qualità del codice. Il software di depurazione del codice offre il rilevamento automatico dei bug durante lo sviluppo e protegge i software consolidati attraverso attenuazioni riflettenti. CodeSan è un metodo coinvolgente, inclusivo e flessibile per gestire in modo efficiente comportamenti indefiniti per sistemi software complessi. Può difendere in modo affidabile grandi sistemi software come Google Chromium e Mozilla Firefox.

Obiettivo

Despite massive efforts in securing software, about 60 security bugs are publicly reported each month. Systems software is prone to low level bugs caused by undefined behavior (memory corruption, type confusion, or API confusion). Exploits abuse undefined behavior to execute attacker specified code, or to leak information. We propose code sanitization (CodeSan), a comprehensive approach to improve code quality. CodeSan will sanitize software by (i) automating bug discovery during development through software testing and (ii) protecting deployed software through reflective mitigations. CodeSan trades formal completeness for practical scalability in three steps: First, policy-based sanitization makes undefined behavior (through violations of memory safety, type safety, or API flow safety) explicit and detectable given concrete test inputs. Second, automatic test case generation increases testing coverage for large programs without the need for pre-existing test cases, enabling broader and automated use of policy-based sanitization. Third, for deployed software, reflective mitigations place runtime checks precisely where they are needed based on data-flow and control-flow coverage from our testing efforts. CodeSan complements formal approaches by protecting software that is currently out of reach due to its size, complexity, or low level nature.

CodeSan is a compelling, comprehensive, and adaptive approach to thoroughly address undefined behavior for complex software. The three proposed thrusts complement each other naturally and will immediately guard large software systems such as Google Chromium, Mozilla Firefox, the Android system, or the Linux kernel, making them resilient against attacks.

In line with PI Payer’s track record on open sourcing his group’s research artifacts on cast sanitization, transformative fuzzing, or control-flow hijacking mitigations, all prototypes produced during CodeSan will be released as open-source.

Meccanismo di finanziamento

ERC-STG - Starting Grant

Istituzione ospitante

ECOLE POLYTECHNIQUE FEDERALE DE LAUSANNE
Contribution nette de l'UE
€ 1 499 970,00
Indirizzo
BATIMENT CE 3316 STATION 1
1015 Lausanne
Svizzera

Mostra sulla mappa

Regione
Schweiz/Suisse/Svizzera Région lémanique Vaud
Tipo di attività
Higher or Secondary Education Establishments
Collegamenti
Costo totale
€ 1 499 970,00

Beneficiari (1)