{"id":"https://openalex.org/W2766468145","doi":"https://doi.org/10.1109/desec.2017.8073800","title":"MIRAGE: Randomizing large chunk allocation via dynamic binary instrumentation","display_name":"MIRAGE: Randomizing large chunk allocation via dynamic binary instrumentation","publication_year":2017,"publication_date":"2017-08-01","ids":{"openalex":"https://openalex.org/W2766468145","doi":"https://doi.org/10.1109/desec.2017.8073800","mag":"2766468145"},"language":"en","primary_location":{"id":"doi:10.1109/desec.2017.8073800","is_oa":false,"landing_page_url":"https://doi.org/10.1109/desec.2017.8073800","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE Conference on Dependable and Secure Computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5048666984","display_name":"Zhenghao Hu","orcid":"https://orcid.org/0000-0002-2146-888X"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhenghao Hu","raw_affiliation_strings":["Shanghai Jiao Tong University"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100320672","display_name":"Yuanyuan Zhang","orcid":"https://orcid.org/0000-0002-8632-5863"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuanyuan Zhang","raw_affiliation_strings":["Shanghai Jiao Tong University"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100644358","display_name":"Hui Wang","orcid":"https://orcid.org/0009-0000-2536-0633"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hui Wang","raw_affiliation_strings":["Shanghai Jiao Tong University"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020082816","display_name":"Juanru Li","orcid":"https://orcid.org/0000-0002-7978-595X"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Juanru Li","raw_affiliation_strings":["Shanghai Jiao Tong University"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078860408","display_name":"Wenbo Yang","orcid":"https://orcid.org/0000-0001-7184-2481"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenbo Yang","raw_affiliation_strings":["Shanghai Jiao Tong University"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5008204306","display_name":"Dawu Gu","orcid":"https://orcid.org/0000-0002-0504-9538"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dawu Gu","raw_affiliation_strings":["Shanghai Jiao Tong University"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University","institution_ids":["https://openalex.org/I183067930"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5048666984"],"corresponding_institution_ids":["https://openalex.org/I183067930"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.14574654,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"98","last_page":"106"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10478","display_name":"Diamond and Carbon-based Materials Research","score":0.9941999912261963,"subfield":{"id":"https://openalex.org/subfields/2505","display_name":"Materials Chemistry"},"field":{"id":"https://openalex.org/fields/25","display_name":"Materials Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/allocator","display_name":"Allocator","score":0.9451192617416382},{"id":"https://openalex.org/keywords/heap","display_name":"Heap (data structure)","score":0.9340859651565552},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8073906898498535},{"id":"https://openalex.org/keywords/c-dynamic-memory-allocation","display_name":"C dynamic memory allocation","score":0.7227907776832581},{"id":"https://openalex.org/keywords/randomness","display_name":"Randomness","score":0.4482566714286804},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.31023770570755005},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.28970852494239807},{"id":"https://openalex.org/keywords/memory-management","display_name":"Memory management","score":0.2228299379348755},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.11161389946937561}],"concepts":[{"id":"https://openalex.org/C162262903","wikidata":"https://www.wikidata.org/wiki/Q343527","display_name":"Allocator","level":2,"score":0.9451192617416382},{"id":"https://openalex.org/C134757568","wikidata":"https://www.wikidata.org/wiki/Q274089","display_name":"Heap (data structure)","level":2,"score":0.9340859651565552},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8073906898498535},{"id":"https://openalex.org/C34339311","wikidata":"https://www.wikidata.org/wiki/Q1050390","display_name":"C dynamic memory allocation","level":4,"score":0.7227907776832581},{"id":"https://openalex.org/C125112378","wikidata":"https://www.wikidata.org/wiki/Q176640","display_name":"Randomness","level":2,"score":0.4482566714286804},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.31023770570755005},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.28970852494239807},{"id":"https://openalex.org/C176649486","wikidata":"https://www.wikidata.org/wiki/Q2308807","display_name":"Memory management","level":3,"score":0.2228299379348755},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.11161389946937561},{"id":"https://openalex.org/C136085584","wikidata":"https://www.wikidata.org/wiki/Q910289","display_name":"Overlay","level":2,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/desec.2017.8073800","is_oa":false,"landing_page_url":"https://doi.org/10.1109/desec.2017.8073800","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE Conference on Dependable and Secure Computing","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5099999904632568,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W119303467","https://openalex.org/W145355838","https://openalex.org/W167216241","https://openalex.org/W1504976174","https://openalex.org/W1535713556","https://openalex.org/W1545927878","https://openalex.org/W1593678010","https://openalex.org/W1878544538","https://openalex.org/W1968154493","https://openalex.org/W2062553811","https://openalex.org/W2102039064","https://openalex.org/W2108860402","https://openalex.org/W2133692747","https://openalex.org/W2136938453","https://openalex.org/W2154795299","https://openalex.org/W2170922286","https://openalex.org/W2281036777","https://openalex.org/W2293825325","https://openalex.org/W2464897789","https://openalex.org/W2574009340","https://openalex.org/W2996990589","https://openalex.org/W4210676563","https://openalex.org/W4250981365","https://openalex.org/W6632050797","https://openalex.org/W6635629245","https://openalex.org/W6639560864","https://openalex.org/W6695237428","https://openalex.org/W6719466390","https://openalex.org/W7057006497","https://openalex.org/W7062490836"],"related_works":["https://openalex.org/W2766468145","https://openalex.org/W92825922","https://openalex.org/W2944895246","https://openalex.org/W4379518516","https://openalex.org/W4379141974","https://openalex.org/W2486766535","https://openalex.org/W3104774169","https://openalex.org/W2361476655","https://openalex.org/W2953153984","https://openalex.org/W2515904313"],"abstract_inverted_index":{"Heap":[0],"security":[1,102],"relies":[2],"heavily":[3],"on":[4],"the":[5,23,53,67,73,101,149],"randomness":[6,32],"of":[7,103,119],"chunk":[8,35,85,145,157],"allocations":[9],"in":[10,28,33,117,172,181],"memory":[11,108,140,151],"allocators":[12,41,152],"to":[13,48,89,147],"mitigate":[14],"heap":[15,18,90,93,124,127],"fengshui":[16,91,125,158],"and":[17,92,115,126,139,159],"spraying":[19,94,128,160],"attacks,":[20,121],"which":[21],"are":[22],"most":[24,105],"widely":[25],"used":[26],"techniques":[27],"modern":[29],"exploits.":[30],"However,":[31],"large":[34,50,84,144],"allocation":[36],"has":[37],"been":[38],"overlooked.":[39],"Memory":[40],"directly":[42],"call":[43],"mmap":[44],"(sometimes":[45],"brk)":[46],"syscall":[47,64],"allocate":[49],"chunks,":[51],"while":[52],"Linux":[54],"kernel":[55],"does":[56],"not":[57],"provide":[58],"a":[59,136,169],"fine-grained":[60,170],"randomization":[61,171],"for":[62],"mmap/brk":[63,173],"-":[65],"only":[66],"base":[68],"address":[69],"is":[70,79],"randomized,":[71],"but":[72],"offset":[74],"between":[75],"every":[76],"two":[77],"syscalls":[78],"predictable.":[80],"The":[81],"less":[82],"randomized":[83],"will":[86],"be":[87,163],"vulnerable":[88],"attacks.":[95,155],"In":[96],"this":[97],"paper,":[98],"we":[99],"assess":[100],"three":[104],"representative":[106],"general-purpose":[107],"allocators,":[109],"Glibc":[110],"ptmalloc,":[111],"OpenBSD":[112],"PHK":[113],"malloc,":[114],"DieHarder,":[116],"scenario":[118],"large-chunk-based":[120,154],"with":[122,168],"successful":[123],"attacks":[129,161],"under":[130],"Nginx.":[131],"We":[132],"then":[133],"present":[134],"MIRAGE,":[135],"transparent,":[137],"portable,":[138],"allocator":[141],"agnostic,":[142],"runtime":[143],"randomizer":[146],"fortify":[148],"existing":[150],"against":[153],"Large":[156],"can":[162],"successfully":[164],"mitigated":[165],"by":[166],"MIRAGE":[167,176],"syscall.":[174],"And,":[175],"imposes":[177],"an":[178],"acceptable":[179],"overhead":[180],"performance.":[182]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
