From 86cbb86e86ee9f2c926624b671ac2516494bfe47 Mon Sep 17 00:00:00 2001 From: =josephproject1 <=joseph.kaberuka@glasgow.ac.uk> Date: Wed, 8 Nov 2023 17:04:12 +0200 Subject: [PATCH 1/4] uintptr_t does not maintain provenance information --- pointerProvenanceIssue.c | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 pointerProvenanceIssue.c diff --git a/pointerProvenanceIssue.c b/pointerProvenanceIssue.c new file mode 100644 index 0000000..94d9761 --- /dev/null +++ b/pointerProvenanceIssue.c @@ -0,0 +1,27 @@ + +#include +#include + +int main () { + +int myArray[10]; + +uintptr_t ptr = (uintptr_t)&myArray[0]; //storing the address as uintptr_t + +//performing an invalid operation - accessing a non existent element + +uintptr_r myPtr = ptr + sizeof(int)* 20; + +//trying to accessing the memory using an invalid pointer + +int myValue = *(int*)myPtr // no memory safety checks + +printf("invalid value : %d\n ",myValue); + + +return 0; + +} + + + From 24ca03a4e5c56ad455183978966b84de4af2c05d Mon Sep 17 00:00:00 2001 From: =josephproject1 <=joseph.kaberuka@glasgow.ac.uk> Date: Wed, 8 Nov 2023 17:28:28 +0200 Subject: [PATCH 2/4] Provenance of the pointer tracks --- CHERIProvenanceOfPointer.c | 22 ++++++++++++++++++++++ 1 file changed, 22 insertions(+) create mode 100644 CHERIProvenanceOfPointer.c diff --git a/CHERIProvenanceOfPointer.c b/CHERIProvenanceOfPointer.c new file mode 100644 index 0000000..ee30f60 --- /dev/null +++ b/CHERIProvenanceOfPointer.c @@ -0,0 +1,22 @@ +#include +#include + +int main(){ + +int myArray[10]; + +int *ptr = &myArray[0]; // storing the pointer as a capability + +//perform a capability safe operation - accessing a valid element + +int myValue = *ptr; + +// access within bounds + +int *new_ptr = ptr + 5; + +printf("valid value : %d\n", myValue); + +return 0; + +} From 589bfa36da9b6e849031147251f5a100cfa75da8 Mon Sep 17 00:00:00 2001 From: =josephproject1 <=joseph.kaberuka@glasgow.ac.uk> Date: Wed, 8 Nov 2023 18:53:13 +0200 Subject: [PATCH 3/4] CHERI facilitates sweeping revocation technique --- CHERIcapabilitySweepingRevocation.c | 47 +++++++++++++++++++++++++++++ 1 file changed, 47 insertions(+) create mode 100644 CHERIcapabilitySweepingRevocation.c diff --git a/CHERIcapabilitySweepingRevocation.c b/CHERIcapabilitySweepingRevocation.c new file mode 100644 index 0000000..8592e96 --- /dev/null +++ b/CHERIcapabilitySweepingRevocation.c @@ -0,0 +1,47 @@ +#include +#include +int main() { + +//create a capability to a memory region + +int data[10] = {0}; + +cheri_object data_cap; + +data_cap = cheri_build_data_cap(data, sizeof(data), CHERI_PERM_LOAD|CHERI_PERM_STORE); + +//read and write access capability + +int* cap_ptr = cheri_cast(int*, data_cap); + +//read and write data + +cap_ptr[0] = 42; + +int value = cap_ptr[0]; + +printf("initial value: %d\n", value); + +//let's simulate a security breach or a vulnerability detection + +//decide to revoke or write access to the memory region + +cheri_set_perms(&data_cap,CHERI_PERM_LOAD);//revoke write permissions + +//attempting to write after revoking triggers an exception + +//uncommenting this line would trigger a capability violation exception + +//cap_ptr[1]=99; + +//however,read access remains allowed + +int read_value = cap_ptr[1]; + +printf("read only value: %d\n", read_value); + +return 0; + + +} + From c8a0b5335779d61d711039bf111e6d2aa10de4f3 Mon Sep 17 00:00:00 2001 From: =josephproject1 <=joseph.kaberuka@glasgow.ac.uk> Date: Thu, 9 Nov 2023 12:25:37 +0200 Subject: [PATCH 4/4] Insecure encapsulation access --- LackofSecureEncapsulationIssue.c | 51 ++++++++++++++++++++++++++++++++ 1 file changed, 51 insertions(+) create mode 100644 LackofSecureEncapsulationIssue.c diff --git a/LackofSecureEncapsulationIssue.c b/LackofSecureEncapsulationIssue.c new file mode 100644 index 0000000..97ab6f5 --- /dev/null +++ b/LackofSecureEncapsulationIssue.c @@ -0,0 +1,51 @@ +#include +#include + +struct Student { + +char name[100]; + +int age; + +}; + +struct Student* create_student(char name*, int age); + +struct Student* student = (struct Student*)malloc(sizeof(struct Student)); + +if(student){ + +strcpy(student->name, name); + +student->age = age; + +} + +return student; + +} + +int main() { + +struct Student* student1 = create_student("Alice", 20); + +struct Student* student2 = create_student("Bob", 22); + +//unintentional access to students data (no encapsulation) + +printf("student1: %s,%d\n", student2->name, student2->age); + +free(student1); +free(student2); + +return 0; + +} + + + + + + + +