GeistHaus
log in · sign up

Compiler Options Hardening Guide for C and C++

best.openssf.org

This is a list of materials (documents, services, and so on) released by the Open Source Security Foundation (OpenSSF) Best Practices Working Group (WG).

6 pages link to this URL
Understanding AddressSanitizer: Better memory safety for your code

This post will guide you through using AddressSanitizer (ASan), a compiler plugin that helps developers detect memory issues in code that can lead to remote code execution attacks (such as WannaCry or this WebP implementation bug). ASan inserts checks around memory accesses during compile time, and crashes the program […]

2 inbound links article en application-securitycompilersfuzzingllvmmemory-safety application-securitycompilersfuzzingllvmmemory-safety
2024 wrapped - vulns.xyz

Dear blog. This post is inspired by an old friend of mine who has been writing these for the past few years. I meant to do this for a while now, but ended up not preparing anything, so this post is me writing it from memory. There’s likely stuff I forgot, me being gentle with myself I’ll probably just permit myself to complete this list the next couple of days.

Hardening C Against ROP: Getting CET Shadow Stacks Working

This post shows you how to use CET user shadow stacks on Linux. CET is a hardening technology that mitigates typical memory unsafety issues on x86. This post will not explain this security feature. If you don’t know what CET is, this post is probably not for you. For general advice on hardening C/C++, check out these guidelines.

0 inbound links article en
A Shorthand for Distributed Systems Exploit Chains

If you have been following the evolution of binary exploitation (and the exploit mitigations arms-race) of the past twenty or so years you can detect a certain pattern: where binary exploitation us…

0 inbound links article en Uncategorized aicybersecuritysecuritytechnology
Clang Hardening Cheat Sheet - Ten Years Later

Ten years ago, we published a Clang Hardening Cheat Sheet. Since then, both the threat landscape and the Clang toolchain have evolved significantly. This blog post presents the new mitigations available in Clang to improve the security of your applications.

2 inbound links en ClangLLVMhardening2026