Publication | Open Access
SoK: Sanitizing for Security
132
Citations
77
References
2019
Year
Unknown Venue
Software MaintenanceEngineeringInformation SecurityAvailable ToolsInformation ForensicsSoftware EngineeringSource Code AnalysisSecurity IssuesFormal VerificationSoftware AnalysisHardware SecurityStatic CheckingProgramming LanguagesStatic AnalysisSecure By DesignData PrivacyComputer ScienceC++ Programming LanguagesStatic Program AnalysisLanguage-based SecurityData SecurityCryptographySoftware SecurityProgram AnalysisSoftware TestingSecuritySystem Software
The C and C++ programming languages are notoriously insecure yet remain indispensable. Developers therefore resort to a multi-pronged approach to find security issues before adversaries. These include manual, static, and dynamic program analysis. Dynamic bug finding tools-henceforth "sanitizers"-can find bugs that elude other types of analysis because they observe the actual execution of a program, and can therefore directly observe incorrect program behavior as it happens. A vast number of sanitizers have been prototyped by academics and refined by practitioners. We provide a systematic overview of sanitizers with an emphasis on their role in finding security issues. Specifically, we taxonomize the available tools and the security vulnerabilities they cover, describe their performance and compatibility properties, and highlight various trade-offs.
| Year | Citations | |
|---|---|---|
Page 1
Page 1