COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring. |
University of Cambridge > Talks.cam > Computer Laboratory Security Seminar > Trojan Source: Invisible Vulnerabilities
Trojan Source: Invisible VulnerabilitiesAdd to your list(s) Download to your calendar using vCal
If you have a question about this talk, please contact Kieron Ivy Turk. See http://talks.cam.ac.uk/talk/index/170144 for details We present a new type of attack in which source code is maliciously encoded so that it appears different to a compiler and to the human eye. This attack exploits subtleties in text-encoding standards such as Unicode to produce source code whose tokens are logically encoded in a different order from the one in which they are displayed, leading to vulnerabilities that cannot be perceived directly by human code reviewers. ‘Trojan Source’ attacks, as we call them, pose an immediate threat both to first-party software and of supply-chain compromise across the industry. We present working examples of Trojan-Source attacks in C, C++, C#, JavaScript, Java, Rust, Go, and Python. We propose definitive compiler-level defenses, and describe other mitigating controls that can be deployed in editors, repositories, and build pipelines while compilers are upgraded to block this attack. This talk is part of the Computer Laboratory Security Seminar series. This talk is included in these lists:Note that ex-directory lists are not shown. |
Other listsSt Johns Women Society Trinity Hall History Society -Other talksProtection-Shopping among Empires: Suspended Sovereignty in the Cocos-Keeling Islands Shifting landscapes of the medieval world: Landscape as literature How does complexity arise from molecular interaction? Qualifying Taste: 'Taste and Knowledge' | gloknos Research Group Analysis of fractional-order functional differential equations with multiple delays A categorical view of conditional expectation |