作者: K. Ashcraft , D. Engler
DOI: 10.1109/SECPRI.2002.1004368
关键词: Computer science 、 Operating system 、 Kernel (image processing) 、 Programmer 、 Compiler 、 Metacompilation 、 Static analysis 、 Feature (machine learning) 、 Pointer (computer programming) 、 Programming language 、 Code (cryptography)
摘要: This paper shows how system-specific static analysis can find security errors that violate rules such as "integers from untrusted sources must be sanitized before use" and "do not dereference user-supplied pointers." In our approach, programmers write extensions are linked into the compiler check their code for errors. We demonstrate approach's effectiveness by using it to over 100 in Linux OpenBSD, 50 of which have led kernel patches. An unusual feature approach is use methods automatically detect when we miss actions should checked.