diff options
| author | JF Bastien <jfb@google.com> | 2015-01-14 01:07:51 +0000 |
|---|---|---|
| committer | JF Bastien <jfb@google.com> | 2015-01-14 01:07:51 +0000 |
| commit | 4cb557039dbc6d764fa2b16f811f37e5accf2f0d (patch) | |
| tree | 9f57935d69debeb8c6c05e3b130821d78562c554 /llvm/lib/Transforms/Instrumentation/MemorySanitizer.cpp | |
| parent | 934361a4b8661410b5c1d8e1f50f3f1c145e8b7e (diff) | |
| download | bcm5719-llvm-4cb557039dbc6d764fa2b16f811f37e5accf2f0d.tar.gz bcm5719-llvm-4cb557039dbc6d764fa2b16f811f37e5accf2f0d.zip | |
Insert random noops to increase security against ROP attacks (clang)
A pass that adds random noops to X86 binaries to introduce diversity with the goal of increasing security against most return-oriented programming attacks.
Command line options:
-noop-insertion // Enable noop insertion.
-noop-insertion-percentage=X // X% of assembly instructions will have a noop prepended (default: 50%, requires -noop-insertion)
-max-noops-per-instruction=X // Randomly generate X noops per instruction. ie. roll the dice X times with probability set above (default: 1). This doesn't guarantee X noop instructions.
In addition, the following 'quick switch' in clang enables basic diversity using default settings (currently: noop insertion and schedule randomization; it is intended to be extended in the future).
-fdiversify
This is the clang part of the patch.
llvm part: D3392
http://reviews.llvm.org/D3393
Patch by Stephen Crane (@rinon)
llvm-svn: 225910
Diffstat (limited to 'llvm/lib/Transforms/Instrumentation/MemorySanitizer.cpp')
0 files changed, 0 insertions, 0 deletions

