This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Insecure Compiler Optimization"
From OWASP
Weilin Zhong (talk | contribs) |
Weilin Zhong (talk | contribs) |
||
Line 2: | Line 2: | ||
==Description== | ==Description== | ||
+ | |||
+ | Security problems caused by compiler optimization. | ||
==Examples == | ==Examples == | ||
+ | |||
+ | * "Dead store removal" | ||
+ | |||
+ | Memory overwriting code is removed by optimizing compiler, which causes sensitive information left in the memory after its usage. | ||
==Related Threats== | ==Related Threats== |
Revision as of 16:45, 5 July 2006
This is a Vulnerability. To view all vulnerabilities, please see the Vulnerability Category page.
Description
Security problems caused by compiler optimization.
Examples
- "Dead store removal"
Memory overwriting code is removed by optimizing compiler, which causes sensitive information left in the memory after its usage.
Related Threats
Related Attacks
Related Vulnerabilities
Related Countermeasures
Related Technologies
Categories
This article is a stub. You can help OWASP by expanding it or discussing it on its Talk page.