Resource Management and Tuples in C∀

Total Page:16

File Type:pdf, Size:1020Kb

Resource Management and Tuples in C∀ Resource Management and Tuples in C8 by Robert Schluntz A thesis presented to the University of Waterloo in fulfillment of the thesis requirement for the degree of Master of Mathematics in Computer Science Waterloo, Ontario, Canada, 2017 © Robert Schluntz 2017 I hereby declare that I am the sole author of this thesis. This is a true copy of the thesis, including any required final revisions, as accepted by my examiners. I understand that my thesis may be made electronically available to the public. ii Abstract C8 is a modern, non-object-oriented extension of the C programming language. This thesis addresses several critical deficiencies of C, notably: resource management, a limited function- return mechanism, and unsafe variadic functions. To solve these problems, two fundamental language features are introduced: tuples and constructors/destructors. While these features exist in prior programming languages, the contribution of this work is engineering these features into a highly complex type system. C is an established language with a dedicated user-base. An important goal is to add new features in a way that naturally feels like C, to appeal to this core user-base, and due to huge amounts of legacy code, maintaining backwards compatibility is crucial. iii Acknowledgements I would like to thank my supervisor, Professor Peter Buhr, for all of his help, including reading the many drafts of this thesis and providing guidance throughout my degree. This work would not have been as enjoyable, nor would it have been as strong without Peter’s knowledge, help, and encouragement. I would like to thank my readers, Professors Gregor Richards and Patrick Lam for all of their helpful feedback. Thanks to Aaron Moss and Thierry Delisle for many helpful discussions, both work-related and not, and for all of the work they have put into the C8 project. This thesis would not have been the same without their efforts. I thank Glen Ditchfield and Richard Bilson, for all of their help with both the design and implementation of C8. I thank my partner, Erin Blackmere, for all of her love and support. Without her, I would not be who I am today. Thanks to my parents, Bob and Jackie Schluntz, for their love and support throughout my life, and for always encouraging me to be my best. Thanks to my best friends, Travis Bartlett, Abraham Dubrisingh, and Kevin Wu, whose companionship is always appreciated. The time we’ve spent together over the past 4 years has always kept me entertained. An extra shout-out to Kaleb Alway, Max Bardakov, Ten Bradley, and Ed Lee, with whom I’ve shared many a great meal; thank you for being my friend. Finally, I would like to acknowledge financial support in the form of a David R. Cheriton Graduate Scholarship and a corporate partnership with Huawei Ltd. iv Table of Contents List of Tables vii 1 Introduction1 1.1 C8 Background...................................1 1.1.1 C Background...............................1 1.1.2 Overloading.................................3 1.1.3 Polymorphism...............................8 1.1.4 Planned Features.............................. 10 1.2 Invariants...................................... 11 1.3 Resource Management............................... 12 1.4 Tuples........................................ 15 1.5 Variadic Functions................................. 18 1.6 Contributions.................................... 20 2 Constructors and Destructors 22 2.1 Design Criteria................................... 22 2.1.1 Calling Syntax............................... 26 2.1.2 Constructor Expressions.......................... 27 2.1.3 Function Generation............................ 28 2.1.4 Using Constructors and Destructors.................... 31 2.1.5 Implicit Destructors............................ 36 2.1.6 Implicit Copy Construction......................... 39 2.2 Implementation................................... 43 2.2.1 Array Initialization............................. 43 2.2.2 Global Initialization............................ 45 v 2.2.3 Static Local Variables........................... 46 2.2.4 Polymorphism............................... 48 2.3 Summary...................................... 49 3 Tuples 50 3.1 Multiple-Return-Value Functions.......................... 50 3.2 Tuple Expressions.................................. 53 3.2.1 Tuple Variables............................... 53 3.2.2 Tuple Indexing............................... 54 3.2.3 Flattening and Structuring......................... 54 3.3 Tuple Assignment.................................. 55 3.3.1 Tuple Construction............................. 57 3.4 Member-Access Tuple Expression......................... 58 3.5 Casting....................................... 60 3.6 Polymorphism.................................... 61 3.6.1 Assertion Inference............................. 63 3.7 Implementation................................... 63 4 Variadic Functions 69 4.1 Design Criteria................................... 69 4.1.1 Whole Tuple Matching........................... 70 4.1.2 A New Typeclass.............................. 71 4.2 Implementation................................... 74 5 Conclusions 81 5.1 Constructors and Destructors............................ 81 5.2 Tuples........................................ 81 5.3 Variadic Functions................................. 82 5.4 Future Work..................................... 82 5.4.1 Constructors and Destructors........................ 82 5.4.2 Tuples.................................... 87 5.4.3 Variadic Functions............................. 87 References 88 vi List of Tables 1.1 The different kinds of type parameters in C8 ....................9 vii Chapter 1 Introduction 1.1 C8 Background C81 is a modern non-object-oriented extension to the C programming language. As it is an extension of C, there is already a wealth of existing C code and principles that govern the design of the language. Among the goals set out in the original design of C8, four points stand out [3]. 1. The behaviour of standard C code must remain the same when translated by a C8 compiler as when translated by a C compiler. 2. Standard C code must be as fast and as small when translated by a C8 compiler as when translated by a C compiler. 3.C 8 code must be at least as portable as standard C code. 4. Extensions introduced by C8 must be translated in the most efficient way possible. Therefore, these design principles must be kept in mind throughout the design and development of new language features. In order to appeal to existing C programmers, great care must be taken to ensure that new features naturally feel like C. These goals ensure existing C code-bases can be converted to C8 incrementally with minimal effort, and C programmers can productively generate C8 code without training beyond the features being used. Unfortunately, C++is actively diverging from C, so incremental additions require significant effort and training, coupled with multiple legacy design-choices that cannot be updated. The current implementation of C8 is a source-to-source translator from C8 to GNU C [6]. The remainder of this section describes some of the important features that currently exist in C8, to give the reader the necessary context in which the new features presented in this thesis must dovetail. 1.1.1 C Background In the context of this work, the term object refers to a region of data storage in the execution environment, the contents of which can represent values [14, p. 6]. 1Pronounced “C-for-all”, and written C8 or Cforall. 1 One of the lesser-known features of standard C is designations. Designations are similar to named parameters in languages such as Python and Scala, except that they only apply to aggregate initializers. Note that in C8, designations use a colon separator, rather than an equals sign as in C, because this syntax is one of the few places that conflicts with the new language features. struct A{ int w,x,y,z; }; A a0={.x:4 .z:1, .x:8 }; A a1={1,.y:7, 6 }; A a2[4] = { [2]:a0, [0]:a1,{.z:3 } }; // equivalent to //A a0={ 0, 8, 0,1}; //A a1={ 1, 0, 7,6}; //A a2[4]={ a1,{ 0, 0, 0,3}, a0,{ 0, 0, 0,0}}; Designations allow specifying the field to initialize by name, rather than by position. Any field not explicitly initialized is initialized as if it had static storage duration [14, p. 141]. A designator specifies the current object for initialization, and as such any undesignated sub-objects pick up where the last initialization left off. For example, in the initialization of a1, the initializer of y is 7, and the unnamed initializer 6 initializes the next sub-object, z. Later initializers override earlier initializers, so a sub-object for which there is more than one initializer is only initialized by its last initializer. These semantics can be seen in the initialization of a0, where x is designated twice, and thus initialized to 8. C also provides compound literal expressions, which provide a first-class mechanism for creating unnamed objects. struct A{ int x,y; }; int f(A, int); int g( int *); f((A){ 3, 4 }, ( int){ 5 } = 10); g(( int[]){ 1, 2, 3 }); g(&( int){ 0 }); Compound literals create an unnamed object, and result in an lvalue, so it is legal to assign a value into a compound literal or to take its address [14, p. 86]. Syntactically, compound literals look like a cast operator followed by a brace-enclosed initializer, but semantically are different from a C cast, which only applies basic conversions and coercions and is never an lvalue. The C8 translator makes use of several GNU C extensions, including nested functions and
Recommended publications
  • CS 0449: Introduction to Systems Software
    CS 0449: Introduction to Systems Software Jonathan Misurda Computer Science Department University of Pittsburgh [email protected] http://www.cs.pitt.edu/∼jmisurda Version 3, revision 1 Last modified: July 27, 2017 at 1:33 P.M. Copyright © 2017 by Jonathan Misurda This text is meant to accompany the course CS 0449 at the University of Pittsburgh. Any other use, commercial or otherwise, is prohibited without permission of the author. All rights reserved. Java is a registered trademark of Oracle Corporation. This reference is dedicated to the students of CS 0449, Fall 2007 (2081). Their patience in dealing with a changing course and feedback on the first version of this text was greatly appreciated. Contents Contents i List of Figures v List of Code Listings vii Preface ix 1 Pointers 1 1.1 Basic Pointers . 2 1.1.1 Fundamental Operations . 2 1.2 Passing Pointers to Functions . 4 1.3 Pointers, Arrays, and Strings . 5 1.3.1 Pointer Arithmetic . 6 1.4 Terms and Definitions . 7 2 Variables: Scope & Lifetime 8 2.1 Scope and Lifetime in C . 9 2.1.1 Global Variables . 11 2.1.2 Automatic Variables . 12 2.1.3 Register variables . 13 2.1.4 Static Variables . 13 2.1.5 Volatile Variables . 16 2.2 Summary Table . 17 2.3 Terms and Definitions . 17 ii Contents 3 Compiling & Linking: From Code to Executable 19 3.1 The Stages of Compilation . 19 3.1.1 The Preprocessor . 20 3.1.2 The Compiler . 21 3.1.3 The Linker . 22 3.2 Executable File Formats .
    [Show full text]
  • Secure Coding in Modern C++
    MASARYK UNIVERSITY FACULTY OF INFORMATICS Secure coding in modern C++ MASTER'S THESIS Be. Matěj Plch Brno, Spring 2018 MASARYK UNIVERSITY FACULTY OF INFORMATICS Secure coding in modern C++ MASTER'S THESIS Be. Matěj Plch Brno, Spring 2018 This is where a copy of the official signed thesis assignment and a copy of the Statement of an Author is located in the printed version of the document. Declaration Hereby I declare that this paper is my original authorial work, which I have worked out on my own. All sources, references, and literature used or excerpted during elaboration of this work are properly cited and listed in complete reference to the due source. Be. Matěj Plch Advisor: RNDr. Jifi Kur, Ph.D. i Acknowledgements I would like to thank my supervisor Jiří Kůr for his valuable guidance and advice. I would also like to thank my parents for their support throughout my studies. ii Abstract This thesis documents how using modern C++ standards can help with writing more secure code. We describe common vulnerabilities, and show new language features which prevent them. We also de• scribe coding conventions and tools which help programmers with using modern C++ features. This thesis can be used as a handbook for programmers who would like to know how to use modern C++ features for writing secure code. We also perform an extensive static analysis of open source C++ projects to find out how often are obsolete constructs of C++ still used in practice. iii Keywords secure coding, modern C++, vulnerabilities, ISO standard, coding conventions,
    [Show full text]
  • CFFI Documentation Release 1.5.2
    CFFI Documentation Release 1.5.2 Armin Rigo, Maciej Fijalkowski February 13, 2016 Contents 1 What’s New 3 1.1 v1.5.2...................................................3 1.2 v1.5.1...................................................3 1.3 v1.5.0...................................................3 1.4 v1.4.2...................................................3 1.5 v1.4.1...................................................3 1.6 v1.4.0...................................................3 1.7 v1.3.1...................................................4 1.8 v1.3.0...................................................4 1.9 v1.2.1...................................................5 1.10 v1.2.0...................................................5 1.11 v1.1.2...................................................5 1.12 v1.1.1...................................................5 1.13 v1.1.0...................................................6 1.14 v1.0.3...................................................6 1.15 v1.0.2...................................................6 1.16 v1.0.1...................................................6 1.17 v1.0.0...................................................6 2 Installation and Status 7 2.1 Platform-specific instructions......................................8 3 Overview 11 3.1 Simple example (ABI level, in-line)................................... 11 3.2 Out-of-line example (ABI level, out-of-line).............................. 12 3.3 Real example (API level, out-of-line).................................. 13 3.4 Struct/Array Example
    [Show full text]
  • A Multilanguage Static Analysis of Python Programs with Native C Extensions Raphaël Monat, Abdelraouf Ouadjaout, Antoine Miné
    A Multilanguage Static Analysis of Python Programs with Native C Extensions Raphaël Monat, Abdelraouf Ouadjaout, Antoine Miné To cite this version: Raphaël Monat, Abdelraouf Ouadjaout, Antoine Miné. A Multilanguage Static Analysis of Python Programs with Native C Extensions. Static Analysis Symposium (SAS), Oct 2021, Chicago, Illinois, United States. hal-03313409 HAL Id: hal-03313409 https://hal.archives-ouvertes.fr/hal-03313409 Submitted on 3 Aug 2021 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. A Multilanguage Static Analysis of Python Programs with Native C Extensions∗ Raphaël Monat1�, Abdelraouf Ouadjaout1�, and Antoine Miné1;2� [email protected] 1 Sorbonne Université, CNRS, LIP6, F-75005 Paris, France 2 Institut Universitaire de France, F-75005, Paris, France Abstract. Modern programs are increasingly multilanguage, to benefit from each programming language’s advantages and to reuse libraries. For example, developers may want to combine high-level Python code with low-level, performance-oriented C code. In fact, one in five of the 200 most downloaded Python libraries available on GitHub contains C code. Static analyzers tend to focus on a single language and may use stubs to model the behavior of foreign function calls.
    [Show full text]
  • C and C++ Functions Variadic User-Defined Standard Predefined
    MODULE 4 FUNCTIONS Receive nothing, return nothing-receive nothing, return something- receive something, return something-receive something, return nothing And they do something. That is a function! My Training Period: hours Note: Function is one of the important topics in C and C++. Abilities ▪ Able to understand and use function. ▪ Able to create user defined functions. ▪ Able to understand Structured Programming. ▪ Able to understand and use macro. ▪ Able to appreciate the recursive function. ▪ Able to find predefined/built-in standard and non-standard functions resources. ▪ Able to understand and use predefined/built-in standard and non-standard functions. ▪ Able to understand and use the variadic functions. 4.1 Some Definition - Most computer programs that solve real-world problem are large, containing thousand to million lines of codes and developed by a team of programmers. - The best way to develop and maintain large programs is to construct them from smaller pieces or modules, each of which is more manageable than the original program. - These smaller pieces are called functions. In C++ you will be introduced to Class, another type smaller pieces construct. - The function and class are reusable. So in C / C++ programs you will encounter and use a lot of functions. There are standard (normally called library) such as maintained by ANSI C / ANSI C++, ISO/IEC C, ISO/IEC C++ and GNU’s glibc or other non-standard functions (user defined or vendors specific or implementations or platforms specific). - If you have noticed, in the previous Modules, you have been introduced with many functions, including the main(). main() itself is a function but with a program execution point.
    [Show full text]
  • The Eval Symbol for Axiomatising Variadic Functions
    The eval symbol for axiomatising variadic functions Lars Hellstr¨om Division of Applied Mathematics, The School of Education, Culture and Communication, M¨alardalen University, Box 883, 721 23 V¨aster˚as,Sweden; [email protected] Abstract This paper describes (and constitutes the source for!) the proposed list4 OpenMath content dictionary. The main feature in this content dictionary is the eval symbol, which treats a list of values as the list of children of an application element. This may, among other things, be employed to state properties of variadic functions. 1 Background and motivation OpenMath is a formal language for (primarily) mathematics. It is not a coherent theory of mathematics, but the standard makes room for and even encourages expressing small fragments of theory in the form of mathematical properties of symbols in content dictionaries. The main purpose of these is to nail down exactly what concept a symbol denotes, and they can take the form of a direct definition of the symbol, but mathematical properties may also clarify a concept in more indirect ways, e.g. by stating that a particular operation is commutative. As a language of formalised mathematical logic, OpenMath is somewhat unusual in allowing application symbols to be variadic|a flexibility that is most commonly used to generalise binary associative operations into general n-ary operations, but it is by no means useful only for that. By contrast, the formal language used in e.g. [2] rather considers the arity to be a built-in property of each function or predicate symbol, and acknowlegdes no particular link between 1 2 unary function symbol one (f1 ) and binary function symbol one (f1 ).
    [Show full text]
  • Customizing GCC with MELT (A Lispy Dialect)
    customizing GCC with MELT (a Lispy dialect) Basile STARYNKEVITCH gcc-melt.org [email protected] or [email protected] CEA, LIST (Software Reliability Lab.), Palaiseau, France [within Université Paris Saclay] January, 31st, 2015, FOSDEM 2015, Lisp Dev Room, (Brussels, Belgium) Basile Starynkevitch GCC MELT January 31st, 2015 (FOSDEM, Brussels) ? 1 / 44 Overview 1 Introduction 2 The MELT language 3 The MELT [meta-] plugin implementation 4 Conclusion Slides available online at gcc-melt.org under (Creative Commons Attribution Share Alike 4.0 Unported license) Basile Starynkevitch GCC MELT January 31st, 2015 (FOSDEM, Brussels) ? 2 / 44 Caveat All opinions are mine only I (Basile) don’t speak for my employer, CEA (or my institute LIST) I don’t speak for the GCC community I don’t speak for anyone else My opinions may be highly controversial My opinions may change Basile Starynkevitch GCC MELT January 31st, 2015 (FOSDEM, Brussels) ♠ 3 / 44 Introduction 1 Introduction 2 The MELT language 3 The MELT [meta-] plugin implementation 4 Conclusion Basile Starynkevitch GCC MELT January 31st, 2015 (FOSDEM, Brussels) ? 4 / 44 Introduction Introduction (audience) Expected audience (FOSDEM2015 Lisp devroom) : familiar with some Lisp-like language (Common Lisp, Scheme, Clojure, Emacs Lisp, . ), and with Linux or some Posix so able to code a toy Lisp evaluator in Lisp free-software friendly and knowledgable sometimes using the Gcc1 compiler (e.g. to build your favorite Lisp implementation runtime from its source code) so knowing a little bit the C (or C++) programming language (knowledge of gcc internals is not pre-supposed) 1Gnu Compiler Collection, no more Gnu C Compiler ! Basile Starynkevitch GCC MELT January 31st, 2015 (FOSDEM, Brussels) ? 5 / 44 Introduction Introduction (Gcc vs LLVM) I don’t know LLVM internally! GCC (GNU compiler collection http://gcc.gnu.org/) GNU, so GPLv3+ licensed (mostly) and FSF copyrighted (was initiated by R.M.
    [Show full text]
  • The Tclquadcode Compiler
    The TclQuadcode Compiler Donal K. Fellows and Kevin B. Kenny Abstract This paper presents work in progress on compilation of Tcl to native code via a novel intermediate language, quadcode, and LLVM IR. It discusses some of the details of how we analyse Tcl in order to make useful type assertions, the strategy for issuing IR and native code, and presents some of the early performance results, which are believed to be of great interest. Overall Picture The Lehenbauer Challenge was set at the Tcl Conference in Chicago in 2012 . It ​ ​ actually consists of two challenges: a challenge to double the speed of Tcl, and a challenge to multiply Tcl’s speed by 10. Doubling Tcl’s speed is not trivial, as it requires greatly improving the speed of key areas such as I/O (e.g., by reducing the number of times a buffer gets copied). Moreover, we have a bytecode engine that is clearly in a local optimum: most small changes to it make it slower, and Tcl 8.6.4’s bytecode now covers almost all operations that it makes sense to have in an inner loop. Possible improvements would be to optimize the generated bytecode at a higher level than the current peephole system, so allowing detection of cases where a reference does not need to be shared and a copy can be avoided. While this would not improve the best Tcl code, it is likely to have quite a strong effect on code out there “in the wild”. The ten-times speedup is not in this category at all.
    [Show full text]
  • Python Tutorial by Bernd Klein
    Python Tutorial by Bernd Klein bodenseo © 2021 Bernd Klein All rights reserved. No portion of this book may be reproduced or used in any manner without written permission from the copyright owner. For more information, contact address: [email protected] www.python-course.eu Python Course Python Tutorial by Bernd Klein Strings.......................................................................................................................................10 Execute a Python script ............................................................................................................11 Start a Python program.............................................................................................................12 Loops ......................................................................................................................................136 Iterators and Iterables .............................................................................................................150 Coffee, Dictionary and a Loop ...............................................................................................171 Parameters and Arguments.....................................................................................................226 Global, Local and nonlocal Variables.....................................................................................237 Regular Expressions ...............................................................................................................305 Lambda, filter, reduce
    [Show full text]
  • Variadic Templates for C++0X
    Vol. 7, No. 2, Special Issue OOPS Track at SAC 2007, February 2008 Variadic Templates for C++0x Douglas Gregor, Department of Computer Science, Indiana University, USA Jaakko J¨arvi, Department of Computer Science, Texas A&M University, USA Generic functions and classes typically accept a fixed number of type arguments. How- ever, generic functions and classes that accept a variable number of type arguments have proven to be a very useful, even though there is no support for this feature in C++. Numerous foundational libraries rely on clever template and preprocessor tricks to emulate such variable-length templates. By several measures these emulations are inadequate. This paper describes variadic templates, an extension to the C++ lan- guage that significantly improves existing implementations of widely used C++ libraries in terms of code size, quality of error diagnostics, compilation speed, and generality. Furthermore, variadic templates enable new applications, such as type-safe imple- mentations of functions like printf, and improved support for generic mixin classes. Variadic templates are part of the upcoming ISO C++ Standard, dubbed C++0x, and we have integrated variadic templates into the GNU C++ compiler. 1 INTRODUCTION Many situations call for generic functions that accept an arbitrary number of param- eters or generic classes that can be instantiated with any number of type arguments. An example of the former kind is a type-safe, secure version of the printf function in C. A parametrized class representing tuple objects is an example of the latter kind. Both of these above scenarios can be supported with variadic templates, an extension to C++ for types parametrized with a varying number of arguments.
    [Show full text]
  • Frama-C User Manual Release 23.1 (Vanadium)
    User Manual Frama-C User Manual Release 23.1 (Vanadium) Loïc Correnson, Pascal Cuoq, Florent Kirchner, André Maroneze, Virgile Prevosto, Armand Puccetti, Julien Signoles and Boris Yakobowski This work is licensed under a Creative Commons “Attribution- ShareAlike 4.0 International” license. CEA-List, Université Paris-Saclay Software Safety and Security Lab ©2009-2021 CEA LIST CONTENTS Contents Foreword 9 1 Introduction 11 1.1 About this document................................ 11 1.2 Outline....................................... 11 2 Overview 13 2.1 What is Frama-C?................................. 13 2.2 Frama-C as a Static Analysis Tool......................... 13 2.2.1 Frama-C as a Lightweight Semantic-Extractor Tool........... 14 2.2.2 Frama-C for Formal Verification of Critical Software.......... 14 2.3 Frama-C as a Tool for C programs......................... 14 2.4 Frama-C as an Extensible Platform........................ 14 2.5 Frama-C as a Collaborative Platform....................... 15 2.6 Frama-C as a Development Platform....................... 15 2.7 Frama-C as an Educational Platform....................... 16 3 Getting Started 17 3.1 Installation..................................... 17 3.2 One Framework, Several Executables....................... 18 3.3 Frama-C Command Line and General Options.................. 19 3.3.1 Getting Help................................ 19 3.3.2 Frama-C Configuration........................... 19 3.3.3 Options Outline.............................. 19 3.3.4 Autocompletion for Options........................ 20 3.3.5 Splitting a Frama-C Execution into Several Steps............ 21 3.3.6 Verbosity and Debugging Levels..................... 22 3.3.7 Copying Output to Files.......................... 22 3.3.8 Terminal Capabilities........................... 23 3.3.9 Getting time................................ 23 5 CONTENTS 3.3.10 Inputs and Outputs of Source Code..................
    [Show full text]
  • Venerable Variadic Vulnerabilities Vanquished Priyam Biswas, Purdue University; Alessandro Di Federico, Politecnico Di Milano; Scott A
    Venerable Variadic Vulnerabilities Vanquished Priyam Biswas, Purdue University; Alessandro Di Federico, Politecnico di Milano; Scott A. Carr, Purdue University; Prabhu Rajasekaran, Stijn Volckaert, Yeoul Na, and Michael Franz, University of California, Irvine; Mathias Payer, Purdue University https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/biswas This paper is included in the Proceedings of the 26th USENIX Security Symposium August 16–18, 2017 • Vancouver, BC, Canada ISBN 978-1-931971-40-9 Open access to the Proceedings of the 26th USENIX Security Symposium is sponsored by USENIX Venerable Variadic Vulnerabilities Vanquished Priyam Biswas1, Alessandro Di Federico2, Scott A. Carr1, Prabhu Rajasekaran3, Stijn Volckaert3, Yeoul Na3, Michael Franz3, and Mathias Payer1 1Department of Computer Science, Purdue University fbiswas12, [email protected], [email protected] 2Dipartimento di Elettronica, Informazione e Bioingegneria, Politecnico di Milano [email protected] 3Department of Computer Science, University of California, Irvine frajasekp, stijnv, yeouln, [email protected] Abstract stractions and high degree of control left to the devel- oper. However, these languages guarantee neither type Programming languages such as C and C++ support vari- nor memory safety, and bugs may lead to memory cor- adic functions, i.e., functions that accept a variable num- ruption. Memory corruption attacks allow adversaries to ber of arguments (e.g., printf). While variadic func- take control of vulnerable applications or to extract sen- tions are flexible, they are inherently not type-safe. In sitive information. fact, the semantics and parameters of variadic functions Modern operating systems and compilers implement are defined implicitly by their implementation. It is left several defense mechanisms to combat memory corrup- to the programmer to ensure that the caller and callee fol- tion attacks.
    [Show full text]