laitimes

Hide invisible vulnerabilities in the source code

author:The Great Demon King looks to the heavens
Hide invisible vulnerabilities in the source code
Hide invisible vulnerabilities in the source code

Researchers at the University of Cambridge have published a paper describing attack methods that hide invisible vulnerabilities in the source code. The POC attack code was published on GitHub. This attack method, known as Trojan-Source, takes advantage of the subtleties in the character encoding standard Unicode, using directional overrides, homogeneity, etc. to create source code that is visually different from the compiler and human code reviewers, and the human eye cannot see the vulnerability, but the logical coding order and display order are different for the compiler. This attack method works for C, C++, C#, JavaScript, Java, Rust, Go, and Python, and researchers have reported vulnerabilities to projects.

Hide invisible vulnerabilities in the source code

Read on