DocumentCode :
1633381
Title :
Using programmer-written compiler extensions to catch security holes
Author :
Ashcraft, Ken ; Engler, Dawson
Author_Institution :
Comput. Syst. Lab., Stanford Univ., CA, USA
fYear :
2002
fDate :
6/24/1905 12:00:00 AM
Firstpage :
143
Lastpage :
159
Abstract :
This paper shows how system-specific static analysis can find security errors that violate rules such as "integers from untrusted sources must be sanitized before use" and "do not dereference user-supplied pointers." In our approach, programmers write system-specific extensions that are linked into the compiler and check their code for errors. We demonstrate the approach\´s effectiveness by using it to find over 100 security errors in Linux and OpenBSD, over 50 of which have led to kernel patches. An unusual feature of our approach is the use of methods to automatically detect when we miss code actions that should be checked.
Keywords :
operating systems (computers); program compilers; program diagnostics; security of data; Linux; OpenBSD; kernel patches; programmer-written compiler extensions; security error finding; system-specific static analysis; Computer errors; Computer security; Contracts; Error analysis; Laboratories; Linux; Operating systems; Program processors; Programming profession; System testing;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Security and Privacy, 2002. Proceedings. 2002 IEEE Symposium on
ISSN :
1081-6011
Print_ISBN :
0-7695-1543-6
Type :
conf
DOI :
10.1109/SECPRI.2002.1004368
Filename :
1004368
Link To Document :
بازگشت