Skip to main content
Other
DieHard: Probabilistic Memory Safety for Unsafe Languages
Computer Science Department Faculty Publication Series
  • Emery D. Berger, University of Massachusetts Amherst
Publication Date
2006
Disciplines
Comments
This paper was harvested from CiteSeer
Abstract

Applications written in unsafe languages like C and C++ are vulnerable to memory errors such as buffer overflows, dangling pointers, and reads of uninitialized data. Such errors can lead to program crashes, security vulnerabilities, and unpredictable behavior. We present DieHard, a runtime system that tolerates these errors while probabilistically maintaining soundness. DieHard uses randomization and replication to achieve probabilistic memory safety by approximating an infinite-sized heap. DieHard’s memory manager randomizes the location of objects in a heap that is at least twice as large as required. This algorithm prevents heap corruption and provides a probabilistic guarantee of avoiding memory errors. For additional safety, DieHard can operate in a replicated mode where multiple replicas of the same application are run simultaneously. By initializing each replica with a different random seed and requiring agreement on output, the replicated version of Die- Hard increases the likelihood of correct execution because errors are unlikely to have the same effect across all replicas. We present analytical and experimental results that show DieHard’s resilience to a wide range of memory errors, including a heap-based buffer overflow in an actual application.

Citation Information
Emery D. Berger. "DieHard: Probabilistic Memory Safety for Unsafe Languages" (2006)
Available at: http://works.bepress.com/emery_berger/1/