Research Article

Tag-Protector: An Effective and Dynamic Detection of Illegal Memory Accesses through Compile Time Code Instrumentation

Table 1

Effectiveness of the proposed tag-protection solution on different applications from BugBench benchmark suite.

ApplicationLines of code (LoC)Bug locationBug typeDetected

bc-1.06 14.4k storage.c:177 Heap overflow Yes
bc-1.06 14.4k util.c:577 Heap overflow Yes
bc-1.06 14.4k bc.c:1425 Global overflow Yes
gzip-1.2.4 8.1k gzip.c:457 Global overflow Yes
man-1.5h1 4.1k man.c:978 Global overflow Yes
ncompress 1.9k compress.c:896 Stack overflow Yes
polymorph-0.40 0.7k polymorph.c:120 Global overflow Yes
polymorph-0.40 0.7k polymorph.c:193 Stack overflow Yes
squid-2.3 93.5k ftp.c:1024 Heap overflow Yes