Research Saturday

Using bidirectionality override characters to obscure code.


Listen Later

Guests Nicholas Boucher and Ross Anderson from the University of Cambridge join Dave Bittner to discuss their research, "Trojan Source: Invisible Vulnerabilities." The researchers present a new type of attack in which source code is maliciously encoded so that it appears different to a compiler and to the human eye. This attack exploits subtleties in text-encoding standards such as Unicode to produce source code whose tokens are logically encoded in a different order from the one in which they are displayed, leading to vulnerabilities that cannot be perceived directly by human code reviewers. ‘Trojan Source’ attacks, as they call them, pose an immediate threat both to first-party software and of supply-chain compromise across the industry. They present working examples of Trojan-Source attacks in C, C++, C#, JavaScript, Java, Rust, Go, and Python. They propose definitive compiler-level defenses, and describe other mitigating controls that can be deployed in editors, repositories, and build pipelines while compilers are upgraded to block this attack.

The project website and research can be found here:

  • Trojan Source: Invisible Source Code Vulnerabilities project website
  • Trojan Source: Invisible Vulnerabilities research paper
  • Learn more about your ad choices. Visit megaphone.fm/adchoices

    ...more
    View all episodesView all episodes
    Download on the App Store

    Research SaturdayBy N2K Networks

    • 4.4
    • 4.4
    • 4.4
    • 4.4
    • 4.4

    4.4

    8 ratings


    More shows like Research Saturday

    View all
    Risky Business by Risky Business Media

    Risky Business

    371 Listeners

    CyberWire Daily by N2K Networks

    CyberWire Daily

    1,028 Listeners

    ChinaPower by CSIS | Center for Strategic and International Studies

    ChinaPower

    209 Listeners

    Smashing Security by Graham Cluley

    Smashing Security

    317 Listeners

    Click Here by Recorded Future News

    Click Here

    418 Listeners

    Darknet Diaries by Jack Rhysider

    Darknet Diaries

    8,077 Listeners

    Cybersecurity Today by Jim Love

    Cybersecurity Today

    175 Listeners

    Hacking Humans by N2K Networks

    Hacking Humans

    315 Listeners

    CISO Series Podcast by David Spark, Mike Johnson, and Andy Ellis

    CISO Series Podcast

    195 Listeners

    Career Notes by N2K Networks

    Career Notes

    14 Listeners

    Pekingology by Center for Strategic and International Studies

    Pekingology

    143 Listeners

    Cybersecurity Headlines by CISO Series

    Cybersecurity Headlines

    139 Listeners

    The AI Fix by Mark Stockley

    The AI Fix

    33 Listeners

    The FAIK Files by Perry Carpenter | N2K Networks

    The FAIK Files

    18 Listeners