Difference between revisions of "Secure coding tools"
From Simson Garfinkel
Jump to navigationJump to search
m |
m |
||
Line 24: | Line 24: | ||
==Optimization Based on Undefined Behavior== | ==Optimization Based on Undefined Behavior== | ||
* [https://people.csail.mit.edu/nickolai/papers/wang-stack.pdf Towards Optimization-Safe Systems: Analyzing the Impact of Undefined Behavior] | |||
* [https://nebelwelt.net/publications/files/15LangSec.pdf The Correctness-Security Gap in Compiler Optimization], D'Silva, Payer and Song, Language Security 2015. | * [https://nebelwelt.net/publications/files/15LangSec.pdf The Correctness-Security Gap in Compiler Optimization], D'Silva, Payer and Song, Language Security 2015. | ||
Revision as of 03:22, 27 June 2018
C/C++:
- Clang Thread Safety Analysis
- Rosecheckers – perform static analysis on C/C++ source
- Compiler-Enforced Buffer Overflow Elimination
Android:
- DidFail – uses static analysis to detect potential leaks – Android
See also:
- https://www.cert.org/secure-coding/products-services/scale.cfm?
- https://www.dhs.gov/science-and-technology/csd-swamp
- https://continuousassurance.org/
Formal Verification Tools
CompCert is a formally verified optimizing C compiler. "On typical embedded processors, code generated by CompCert typically runs twice as fast as code generated by GCC without optimizations, and only 20% slower than GCC code at optimization level 3. Details about the benchmark mix used to obtain these numbers are available on request."
CompCert is free for non-commercial use.
Optimization Based on Undefined Behavior
- Towards Optimization-Safe Systems: Analyzing the Impact of Undefined Behavior
- The Correctness-Security Gap in Compiler Optimization, D'Silva, Payer and Song, Language Security 2015.
- What every compiler writer should know about programmers, or, “Optimization” based on undefined behaviour hurts performance, M. Anton Ertl and TU Wien, KPS 2015
Optimizations and the Loss of Causality], CERT Technical Report CS 15-392, Robert C. Seacord