Memory safety is a concern in software development that aims to avoid software bugs that cause security vulnerabilities dealing with random-access memory (RAM) access, such as buffer overflows and dangling pointers.
Computer languages such as C and C++ that support arbitrary pointer arithmetic, casting, and deallocation are typically not memory safe. There are several different approaches to find errors in such languages, see the Detection section below.
The Cyclone language uses a hybrid approach, including "fat pointers" (pointers that carry their metadata directly)[1] and regions[2] to give programmers some low-level control while still ensuring memory safety.
Most high-level programming languages avoid the problem by disallowing pointer arithmetic and casting entirely, and by enforcing tracing garbage collection as the sole memory management scheme.
A language could support even more uses of pointer arithmetic, casting, and deallocation without sacrificing memory safety by using automated theorem proving as a form of static code analysis. ESC/Java and D demonstrate two ways that programmers can declare their invariants in ways that can be understood by a theorem prover.
Contents |
Several types of memory errors can occur, depending on which programming language is used:
A pointer which refers to memory which has been deallocated is called a dangling pointer. In languages with manual memory management, dangling pointers can arise when a programmer deallocates a pointers associated memory, then dereferences the pointer.
int *a = new int; int *b = a; delete b; /* a and b are now dangling pointers */ *a = 4; /* Memory error: we may be overwriting another pointer's data */
The simple existence of dangling pointers does not constitute a memory error. However, reading from or writing to a dangling pointer would be erroneous, as the referenced memory may have been overwritten or reassigned.
Buffers is a temporary data storage area. Buffer overflow is the most common way for an attacker outside the system to gain unauthorized access to the target system. A buffer overflow occurs when a program tries to store more data in a buffer than it was intended to hold. Since buffers are created to contain a finite amount of data, the extra information can overflow into adjacent buffers, corrupting or overwriting the valid data held in them.It allows attacker to interfere into the existing process code. Attacker uses buffer or stack overflow to do following,
E.g.consider the following program
#include <stdio.h> #define ARRAY_SIZE 128 int main(int argc, char *argv[]) { char arr[ARRAY_SIZE]; if(argc < 2) return -1; else { strcpy(arr, argv[1]); return 0; } }
As long as the size of this array is less than ARRAY_SIZE program works properly.If the size of the command line argument is greater than that ARRAY_SIZE then it won't work properly. strcpy function will work until it encounters NULL terminator(\0) or until the program crashes.This program suffers from the buffer overflow problem.
Some programming languages are immune to buffer overflow.Perl automatically resizes arrays, and Ada95 detects and prevents buffer overflow.
There are many different ways to detect memory errors in programs written in unsafe languages:
|