Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Programming '18 SRC: Safe Execution of LLVM-based Languages on the Java Virtual Machine

Programming '18 SRC: Safe Execution of LLVM-based Languages on the Java Virtual Machine

Slides to the talk of the Programming '18 Student Research Competition (https://2018.programming-conference.org/track/programming-2018-src#Winners)

Manuel Rigger

April 11, 2018
Tweet

More Decks by Manuel Rigger

Other Decks in Research

Transcript

  1. Safe Execution of LLVM-based Languages on the Java Virtual Machine

    Manuel Rigger Institute for System Software Supervisor: Hanspeter Mössenböck Programming SRC, April 11, 2018
  2. Example 2 long buf[50]; buf[50] = 0x832324321; Unsafe languages (e.g.,

    C) Undefined Behavior Unsafe languages do not specify the semantics of erroneous code
  3. Buffer Overflows 3 long buf[50]; buf[50] = 0x832324321; Caller s

    return address buf[49] buf[0] x + 50 x + 58 x + 0
  4. Buffer Overflows 4 long buf[50]; buf[50] = 0x832324321; Caller s

    return address buf[49] buf[0] x + 50 x + 58 x + 0 0x832324321 buf[49] buf[0] x + 50 x + 58 x + 0
  5. Buffer Overflows 4 long buf[50]; buf[50] = 0x832324321; Caller s

    return address buf[49] buf[0] x + 50 x + 58 x + 0 0x832324321 buf[49] buf[0] x + 50 x + 58 x + 0 Attackers can exploit buffer overflows to divert the control flow of the program execve()
  6. Buffer Overflows 4 long buf[50]; buf[50] = 0x832324321; Caller s

    return address buf[49] buf[0] x + 50 x + 58 x + 0 0x832324321 buf[49] buf[0] x + 50 x + 58 x + 0 Attackers can exploit buffer overflows to divert the control flow of the program execve()
  7. Safe Languages 5 Java ArrayIndexOutOfBoundsException int[] arr = new int[50];

    arr[50] = … The Java Virtual Machine (JVM) automatically checks accesses
  8. Safe Languages 5 Java ArrayIndexOutOfBoundsException int[] arr = new int[50];

    arr[50] = … The Java Virtual Machine (JVM) automatically checks accesses
  9. Goal of my PhD 6 Safely and Efficiently Execute Unsafe

    Languages on the Java Virtual Machine
  10. Contributions (Areas) 7 Safe Sulong Safe Sulong, a system to

    safely and efficiently execute unsafe languages on the Java Virtual Machine
  11. Contributions (Areas) 8 Empirical Studies Safe Sulong Safe Sulong, a

    system to safely and efficiently execute unsafe languages on the Java Virtual Machine Empirical studies on unstandardized constructs in C code to prioritize their implementation in Safe Sulong
  12. Contributions (Areas) 9 Intros- pection Empirical Studies Safe Sulong An

    introspection interface to allow programmers enhance the robustness of their libraries Safe Sulong, a system to safely and efficiently execute unsafe languages on the Java Virtual Machine Empirical studies on unstandardized constructs in C code to prioritize their implementation in Safe Sulong
  13. Execution of LLVM IR 11 Safe Execution Platform LLVM IR

    Clang C C++ GCC Fortran Other LLVM frontend ...
  14. Execution of LLVM IR 11 Safe Execution Platform LLVM IR

    Clang C C++ GCC Fortran Other LLVM frontend ... Lattner, et al. LLVM: A compilation framework for lifelong program analysis & transformation. In CGO 2004
  15. Execution of LLVM IR 11 Safe Execution Platform LLVM IR

    Clang C C++ GCC Fortran Other LLVM frontend ... Lattner, et al. LLVM: A compilation framework for lifelong program analysis & transformation. In CGO 2004
  16. Execution of LLVM IR 11 Safe Execution Platform LLVM IR

    Clang C C++ GCC Fortran Other LLVM frontend ... Lattner, et al. LLVM: A compilation framework for lifelong program analysis & transformation. In CGO 2004 Targeting LLVM IR allows executing several unsafe languages
  17. Execution of LLVM IR 11 Safe Execution Platform LLVM IR

    Clang C C++ GCC Fortran Other LLVM frontend ... Lattner, et al. LLVM: A compilation framework for lifelong program analysis & transformation. In CGO 2004
  18. Execution of LLVM IR 12 LLVM IR Interpreter Truffle LLVM

    IR Graal JVM Würthinger, et al. One VM to rule them all. In Onward!
  19. Found Errors • 68 errors in open-source projects • 8

    errors not found by LLVM’s AddressSanitizer and Valgrind 14 int main(int argc, char** argv) { printf("%d %s\n", argc, argv[5]); } Out-of-bounds accesses to argv are not instrumented by ASan https://github.com/google/sanitizers/issues/762
  20. Evaluation: Peak Performance 16 Baseline is Clang –O0, Safe Sulong

    is faster in all but one case lower is better
  21. 20 if (__builtin_expect(x, 0)) foo(); asm("rdtsc":"=a"(tickl),"=d"(tickh)); Inline Assembly C Projects

    Consist of More Than C Code Compiler builtins • Should they be supported in Safe Sulong? • Which ones should be implemented?
  22. Which ones and how often are they used? 21 Instructions

    In % of projects rdtsc 27.4% cpuid 25.4% mov 24.9% Builtins In % of projects __builtin_expect 48.2% __builtin_clz 29.3% __builtin_bswap32 26.2% GCC compiler builtins Inline assembly
  23. C Projects Consist of More Than C Code 22 1600

    builtins to support 99% of projects
  24. C Projects Consist of More Than C Code 22 1600

    builtins to support 99% of projects Allowed prioritizing their implementation in Safe Sulong
  25. Introspection Functions 24 int *arr = malloc(sizeof (int) * 10)

    ; int *ptr = &(arr[4]); printf ("%ld\n", size_right(ptr)); // prints 24 _size_right() sizeof(int) * 10
  26. Introspection Functions 24 int *arr = malloc(sizeof (int) * 10)

    ; int *ptr = &(arr[4]); printf ("%ld\n", size_right(ptr)); // prints 24 _size_right() sizeof(int) * 10 The introspection interface also allows querying other metadata (e.g., types)
  27. Example: strlen() 25 size_t strlen(const char *str) { size_t len

    = 0; while (*str != '\0') { len++; str++; } return len; }
  28. Example: strlen() 25 size_t strlen(const char *str) { size_t len

    = 0; while (*str != '\0') { len++; str++; } return len; } P r o g r a m m i n g \0 ... ...
  29. Example: strlen() 25 size_t strlen(const char *str) { size_t len

    = 0; while (*str != '\0') { len++; str++; } return len; } P r o g r a m m i n g \0 ... ...
  30. Example: strlen() 25 size_t strlen(const char *str) { size_t len

    = 0; while (*str != '\0') { len++; str++; } return len; } 11 P r o g r a m m i n g \0 ... ...
  31. Example: strlen() 26 size_t strlen(const char *str) { size_t len

    = 0; while (*str != '\0') { len++; str++; } return len; } P r o g r a m m i n g ... ...
  32. Example: strlen() 26 size_t strlen(const char *str) { size_t len

    = 0; while (*str != '\0') { len++; str++; } return len; } P r o g r a m m i n g ... ...
  33. Example: strlen() 26 size_t strlen(const char *str) { size_t len

    = 0; while (*str != '\0') { len++; str++; } return len; } 23415 P r o g r a m m i n g ... ...
  34. size_t strlen(const char *str) { size_t len = 0; while

    (size_right(str) > 0 && *str != '\0') { len++; str++; } return len; } Example: strlen() 27 P r o g r a m m i n g ... ...
  35. size_t strlen(const char *str) { size_t len = 0; while

    (size_right(str) > 0 && *str != '\0') { len++; str++; } return len; } Example: strlen() 27 P r o g r a m m i n g ... ...
  36. size_t strlen(const char *str) { size_t len = 0; while

    (size_right(str) > 0 && *str != '\0') { len++; str++; } return len; } Example: strlen() 27 11 P r o g r a m m i n g ... ...