Abstract
Dangling pointers and/or use-after-free pointers are gateways to exploits for software such as browsers, operating systems, etc. To forestall attacks that rely on dangling or user-after-free pointers, ordinary pointers in source code can be replaced by secure pointers. However, rolling out code with such replacement requires the developer to incur testing and engineering costs. Further, due to the likely memory and runtime overheads of secure pointers, it is useful to identify ordinary pointers in source code that merit replacement. This disclosure describes techniques to determine which ordinary pointers in source code are suitable for replacement by secure pointers.
Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.
Recommended Citation
Hara, Kentaro, "Locating and Securing Use-After-Free Pointers", Technical Disclosure Commons, (January 06, 2021)
https://www.tdcommons.org/dpubs_series/3943