From 86cbb86e86ee9f2c926624b671ac2516494bfe47 Mon Sep 17 00:00:00 2001 From: =josephproject1 <=joseph.kaberuka@glasgow.ac.uk> Date: Wed, 8 Nov 2023 17:04:12 +0200 Subject: [PATCH 1/3] uintptr_t does not maintain provenance information --- pointerProvenanceIssue.c | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) create mode 100644 pointerProvenanceIssue.c diff --git a/pointerProvenanceIssue.c b/pointerProvenanceIssue.c new file mode 100644 index 0000000..94d9761 --- /dev/null +++ b/pointerProvenanceIssue.c @@ -0,0 +1,27 @@ + +#include +#include + +int main () { + +int myArray[10]; + +uintptr_t ptr = (uintptr_t)&myArray[0]; //storing the address as uintptr_t + +//performing an invalid operation - accessing a non existent element + +uintptr_r myPtr = ptr + sizeof(int)* 20; + +//trying to accessing the memory using an invalid pointer + +int myValue = *(int*)myPtr // no memory safety checks + +printf("invalid value : %d\n ",myValue); + + +return 0; + +} + + + From 24ca03a4e5c56ad455183978966b84de4af2c05d Mon Sep 17 00:00:00 2001 From: =josephproject1 <=joseph.kaberuka@glasgow.ac.uk> Date: Wed, 8 Nov 2023 17:28:28 +0200 Subject: [PATCH 2/3] Provenance of the pointer tracks --- CHERIProvenanceOfPointer.c | 22 ++++++++++++++++++++++ 1 file changed, 22 insertions(+) create mode 100644 CHERIProvenanceOfPointer.c diff --git a/CHERIProvenanceOfPointer.c b/CHERIProvenanceOfPointer.c new file mode 100644 index 0000000..ee30f60 --- /dev/null +++ b/CHERIProvenanceOfPointer.c @@ -0,0 +1,22 @@ +#include +#include + +int main(){ + +int myArray[10]; + +int *ptr = &myArray[0]; // storing the pointer as a capability + +//perform a capability safe operation - accessing a valid element + +int myValue = *ptr; + +// access within bounds + +int *new_ptr = ptr + 5; + +printf("valid value : %d\n", myValue); + +return 0; + +} From 589bfa36da9b6e849031147251f5a100cfa75da8 Mon Sep 17 00:00:00 2001 From: =josephproject1 <=joseph.kaberuka@glasgow.ac.uk> Date: Wed, 8 Nov 2023 18:53:13 +0200 Subject: [PATCH 3/3] CHERI facilitates sweeping revocation technique --- CHERIcapabilitySweepingRevocation.c | 47 +++++++++++++++++++++++++++++ 1 file changed, 47 insertions(+) create mode 100644 CHERIcapabilitySweepingRevocation.c diff --git a/CHERIcapabilitySweepingRevocation.c b/CHERIcapabilitySweepingRevocation.c new file mode 100644 index 0000000..8592e96 --- /dev/null +++ b/CHERIcapabilitySweepingRevocation.c @@ -0,0 +1,47 @@ +#include +#include +int main() { + +//create a capability to a memory region + +int data[10] = {0}; + +cheri_object data_cap; + +data_cap = cheri_build_data_cap(data, sizeof(data), CHERI_PERM_LOAD|CHERI_PERM_STORE); + +//read and write access capability + +int* cap_ptr = cheri_cast(int*, data_cap); + +//read and write data + +cap_ptr[0] = 42; + +int value = cap_ptr[0]; + +printf("initial value: %d\n", value); + +//let's simulate a security breach or a vulnerability detection + +//decide to revoke or write access to the memory region + +cheri_set_perms(&data_cap,CHERI_PERM_LOAD);//revoke write permissions + +//attempting to write after revoking triggers an exception + +//uncommenting this line would trigger a capability violation exception + +//cap_ptr[1]=99; + +//however,read access remains allowed + +int read_value = cap_ptr[1]; + +printf("read only value: %d\n", read_value); + +return 0; + + +} +