[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.5555/829514.830533guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Using Programmer-Written Compiler Extensions to Catch Security Holes

Published: 12 May 2002 Publication History

Abstract

This paper shows how system-specific static analysis can find securityerrors that violate rules such as ``integers from untrusted sourcesmust be sanitized before use'' and ``do not dereference user-suppliedpointers.''In our approach, programmers write system-specificextensions that are linked into the compiler and check their code forerrors.We demonstrate the approach's effectiveness by using it tofind over 100 security errors in Linux and OpenBSD, over 50 of whichhave led to kernel patches.An unusual feature of our approach is theuse of methods to automatically detect when we miss code actions thatshould be checked.

Cited By

View all
  • (2021)Breakfast of championsProceedings of the Workshop on Hot Topics in Operating Systems10.1145/3458336.3465287(199-205)Online publication date: 1-Jun-2021
  • (2018)Automated reduction of attack surface using call graph enumerationProceedings of the 2018 2nd International Conference on Management Engineering, Software Engineering and Service Sciences10.1145/3180374.3181327(118-121)Online publication date: 13-Jan-2018
  • (2017)Research on dynamic heuristic scanning technique and the application of the malicious code detection modelInformation Processing Letters10.1016/j.ipl.2016.06.014117:C(19-24)Online publication date: 1-Jan-2017
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
SP '02: Proceedings of the 2002 IEEE Symposium on Security and Privacy
May 2002
ISBN:0769515436

Publisher

IEEE Computer Society

United States

Publication History

Published: 12 May 2002

Author Tags

  1. metacompilation
  2. security holes
  3. system-specific static analysis
  4. tools

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 23 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2021)Breakfast of championsProceedings of the Workshop on Hot Topics in Operating Systems10.1145/3458336.3465287(199-205)Online publication date: 1-Jun-2021
  • (2018)Automated reduction of attack surface using call graph enumerationProceedings of the 2018 2nd International Conference on Management Engineering, Software Engineering and Service Sciences10.1145/3180374.3181327(118-121)Online publication date: 13-Jan-2018
  • (2017)Research on dynamic heuristic scanning technique and the application of the malicious code detection modelInformation Processing Letters10.1016/j.ipl.2016.06.014117:C(19-24)Online publication date: 1-Jan-2017
  • (2016)Twice the Bits, Twice the TroubleProceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security10.1145/2976749.2978403(541-552)Online publication date: 24-Oct-2016
  • (2016)Lightweight Capability DomainsACM SIGOPS Operating Systems Review10.1145/2883591.288360149:2(44-50)Online publication date: 20-Jan-2016
  • (2015)Towards improving software security using language engineering and mbeddr CProceedings of the Workshop on Domain-Specific Modeling10.1145/2846696.2846698(55-62)Online publication date: 27-Oct-2015
  • (2015)Lightweight capability domainsProceedings of the 8th Workshop on Programming Languages and Operating Systems10.1145/2818302.2818307(8-14)Online publication date: 4-Oct-2015
  • (2015)Cross-checking semantic correctnessProceedings of the 25th Symposium on Operating Systems Principles10.1145/2815400.2815422(361-377)Online publication date: 4-Oct-2015
  • (2014)Lightweight automated detection of unsafe information leakage via exceptionsProceedings of the 2014 International Symposium on Software Testing and Analysis10.1145/2610384.2610412(327-338)Online publication date: 21-Jul-2014
  • (2013)Program transformations to fix C integersProceedings of the 2013 International Conference on Software Engineering10.5555/2486788.2486892(792-801)Online publication date: 18-May-2013
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media