Research Article
Tag-Protector: An Effective and Dynamic Detection of Illegal Memory Accesses through Compile Time Code Instrumentation
Table 1
Effectiveness of the proposed tag-protection solution on different applications from BugBench benchmark suite.
| Application | Lines of code (LoC) | Bug location | Bug type | Detected |
| bc-1.06 | 14.4k | storage.c:177 | Heap overflow | Yes | bc-1.06 | 14.4k | util.c:577 | Heap overflow | Yes | bc-1.06 | 14.4k | bc.c:1425 | Global overflow | Yes | gzip-1.2.4 | 8.1k | gzip.c:457 | Global overflow | Yes | man-1.5h1 | 4.1k | man.c:978 | Global overflow | Yes | ncompress | 1.9k | compress.c:896 | Stack overflow | Yes | polymorph-0.40 | 0.7k | polymorph.c:120 | Global overflow | Yes | polymorph-0.40 | 0.7k | polymorph.c:193 | Stack overflow | Yes | squid-2.3 | 93.5k | ftp.c:1024 | Heap overflow | Yes |
|
|