When memory corruption met concurrency: vulnerabilities in concurrent programs

dc.contributor.authorLlorente Vázquez, Oscar
dc.contributor.authorSantos Grueiro, Igor
dc.contributor.authorBringas García, Pablo
dc.date.accessioned2025-09-02T15:16:53Z
dc.date.available2025-09-02T15:16:53Z
dc.date.issued2023
dc.date.updated2025-09-02T15:16:53Z
dc.description.abstractConcurrent programs are widespread in modern systems. They make better use of processor resources but inevitably introduce a new set of problems in terms of reliability and security. Concurrency bugs usually lead to program crashes and unexpected behavior, and are an active research topic. From a security perspective, concurrency vulnerabilities are those that exhibit harmful behavior exclusively in concurrent executions. They can take place in a diverse range of environments, such as in operating system kernels, file system operations, or general-purpose multithreaded programs. A particular characteristic of concurrency is that it not only introduces new problems, but also enables traditional vulnerabilities to be triggered in concurrent-specific ways. Those that lead to dangerous security vulnerabilities usually cause memory corruption, a strong and flexible primitive for exploitation, and are known as concurrency memory corruption vulnerabilities. In this paper, we systematically analyze concurrency vulnerabilities in C and C++ programs, their exploitation and their detection, focusing on concurrency memory corruption vulnerabilities. We organize previous work on concurrency bug characteristics and detection, and highlight the differences in relation to vulnerabilities. Then, we examine the existence of concurrency vulnerabilities in real-world programs by searching the CVE database and point out a growing trend. Further, we analyze and compare existing detection approaches towards concurrency memory corruption.en
dc.description.sponsorshipThe work of Oscar Llorente-Vazquez was supported in part by the Basque Government under a Pre-Doctoral Granten
dc.identifier.citationLlorente-Vazquez, O., Santos-Grueiro, I., & Bringas, P. G. (2023). When memory corruption met concurrency: vulnerabilities in concurrent programs. IEEE Access, 11, 44725-44740. https://doi.org/10.1109/ACCESS.2023.3272833
dc.identifier.doi10.1109/ACCESS.2023.3272833
dc.identifier.eissn2169-3536
dc.identifier.urihttps://hdl.handle.net/20.500.14454/3453
dc.language.isoeng
dc.publisherInstitute of Electrical and Electronics Engineers Inc.
dc.subject.otherConcurrency memory corruption
dc.subject.otherConcurrency vulnerabilities
dc.subject.otherRace condition
dc.titleWhen memory corruption met concurrency: vulnerabilities in concurrent programsen
dc.typereview article
dcterms.accessRightsopen access
oaire.citation.endPage44740
oaire.citation.startPage44725
oaire.citation.titleIEEE Access
oaire.citation.volume11
oaire.licenseConditionhttps://creativecommons.org/licenses/by/4.0/
oaire.versionVoR
Archivos
Bloque original
Mostrando 1 - 1 de 1
Cargando...
Miniatura
Nombre:
llorente_when_2023.pdf
Tamaño:
1.08 MB
Formato:
Adobe Portable Document Format
Colecciones