Security analysis of system code using static typing

Operating system kernels need to manipulate data that comes from user programs through system calls. If it is done in an incautious manner, a security vulnerability known as the Confused Deputy Problem can lead to information disclosure or privilege escalation. The goal of this thesis is to use stat...

Full description

Bibliographic Details
Main Author: Millon, Etienne
Other Authors: Paris 6, Chailloux, Emmanuel
Format: Thesis
Language:French
Published: 2014
Subjects:
eco
Online Access:http://www.theses.fr/2014PA066120/document
id fttriple:oai:gotriple.eu:10670/1.5sy4dr
record_format openpolar
spelling fttriple:oai:gotriple.eu:10670/1.5sy4dr 2023-05-15T18:32:45+02:00 Security analysis of system code using static typing Analyse de sécurité de logiciels système par typage statique Millon, Etienne Paris 6 Chailloux, Emmanuel 2014-07-10 http://www.theses.fr/2014PA066120/document fr fre 10670/1.5sy4dr http://www.theses.fr/2014PA066120/document other Theses.fr Sécurité Typage Isolation Linux Pointeurs utilisateur Mémoire Typing Security socio eco Thesis https://vocabularies.coar-repositories.org/resource_types/c_46ec/ 2014 fttriple 2023-01-22T17:37:39Z Operating system kernels need to manipulate data that comes from user programs through system calls. If it is done in an incautious manner, a security vulnerability known as the Confused Deputy Problem can lead to information disclosure or privilege escalation. The goal of this thesis is to use static typing to detect the dangerous uses of pointers that are controlled by userspace. Most operating systems are written in the C language. We start by isolating Safespeak, a safe subset of it. Its operational semantics as well as a type system are described, and the classic properties of type safety are established. Memory states are manipulated using bidirectional lenses, which can encode partial updates to states and variables. A first analysis is described, that identifies integers used as bitmasks, which are a common source of bugs in C programs. Then, we add to Safespeak the notion of pointers coming from userspace. This breaks type safety, but it is possible to get it back by assigning a different type to the pointers that are controlled by userspace. This distinction forces their dereferencing to be done in a controlled fashion. This technique makes it possible to detect two bugs in the Linux kernel: the first one is in a video driver for an AMD video card, and the second one in the ptrace system call for the Blackfin architecture. Les noyaux de systèmes d'exploitation manipulent des données fournies par les programmes utilisateur via les appels système. Si elles sont manipulées sans prendre une attention particulière, une faille de sécurité connue sous le nom de Confused Deputy Problem peut amener à des fuites de données confidentielles ou l'élévation de privilèges d'un attaquant. Le but de cette thèse est d'utiliser des techniques de typage statique afin de détecter les manipulations dangereuses de pointeurs contrôlés par l'espace utilisateur. La plupart des systèmes d'exploitation sont écrits dans le langage C. On commence par en isoler un sous-langage sûr nommé Safespeak. Sa sémantique opérationnelle et ... Thesis The Pointers Unknown
institution Open Polar
collection Unknown
op_collection_id fttriple
language French
topic Sécurité
Typage
Isolation
Linux
Pointeurs utilisateur
Mémoire
Typing
Security
socio
eco
spellingShingle Sécurité
Typage
Isolation
Linux
Pointeurs utilisateur
Mémoire
Typing
Security
socio
eco
Millon, Etienne
Security analysis of system code using static typing
topic_facet Sécurité
Typage
Isolation
Linux
Pointeurs utilisateur
Mémoire
Typing
Security
socio
eco
description Operating system kernels need to manipulate data that comes from user programs through system calls. If it is done in an incautious manner, a security vulnerability known as the Confused Deputy Problem can lead to information disclosure or privilege escalation. The goal of this thesis is to use static typing to detect the dangerous uses of pointers that are controlled by userspace. Most operating systems are written in the C language. We start by isolating Safespeak, a safe subset of it. Its operational semantics as well as a type system are described, and the classic properties of type safety are established. Memory states are manipulated using bidirectional lenses, which can encode partial updates to states and variables. A first analysis is described, that identifies integers used as bitmasks, which are a common source of bugs in C programs. Then, we add to Safespeak the notion of pointers coming from userspace. This breaks type safety, but it is possible to get it back by assigning a different type to the pointers that are controlled by userspace. This distinction forces their dereferencing to be done in a controlled fashion. This technique makes it possible to detect two bugs in the Linux kernel: the first one is in a video driver for an AMD video card, and the second one in the ptrace system call for the Blackfin architecture. Les noyaux de systèmes d'exploitation manipulent des données fournies par les programmes utilisateur via les appels système. Si elles sont manipulées sans prendre une attention particulière, une faille de sécurité connue sous le nom de Confused Deputy Problem peut amener à des fuites de données confidentielles ou l'élévation de privilèges d'un attaquant. Le but de cette thèse est d'utiliser des techniques de typage statique afin de détecter les manipulations dangereuses de pointeurs contrôlés par l'espace utilisateur. La plupart des systèmes d'exploitation sont écrits dans le langage C. On commence par en isoler un sous-langage sûr nommé Safespeak. Sa sémantique opérationnelle et ...
author2 Paris 6
Chailloux, Emmanuel
format Thesis
author Millon, Etienne
author_facet Millon, Etienne
author_sort Millon, Etienne
title Security analysis of system code using static typing
title_short Security analysis of system code using static typing
title_full Security analysis of system code using static typing
title_fullStr Security analysis of system code using static typing
title_full_unstemmed Security analysis of system code using static typing
title_sort security analysis of system code using static typing
publishDate 2014
url http://www.theses.fr/2014PA066120/document
genre The Pointers
genre_facet The Pointers
op_source Theses.fr
op_relation 10670/1.5sy4dr
http://www.theses.fr/2014PA066120/document
op_rights other
_version_ 1766216930346139648