<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>编译器安全 on Answer</title>
    <link>https://answer.freetools.me/tags/%E7%BC%96%E8%AF%91%E5%99%A8%E5%AE%89%E5%85%A8/</link>
    <description>Recent content in 编译器安全 on Answer</description>
    <generator>Hugo -- 0.152.2</generator>
    <language>zh-cn</language>
    <lastBuildDate>Sat, 07 Mar 2026 20:40:59 +0800</lastBuildDate>
    <atom:link href="https://answer.freetools.me/tags/%E7%BC%96%E8%AF%91%E5%99%A8%E5%AE%89%E5%85%A8/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>一行看不见的字符如何让编译器背叛你：从Unicode双向文本到Trojan Source的供应链暗战</title>
      <link>https://answer.freetools.me/%E4%B8%80%E8%A1%8C%E7%9C%8B%E4%B8%8D%E8%A7%81%E7%9A%84%E5%AD%97%E7%AC%A6%E5%A6%82%E4%BD%95%E8%AE%A9%E7%BC%96%E8%AF%91%E5%99%A8%E8%83%8C%E5%8F%9B%E4%BD%A0%E4%BB%8Eunicode%E5%8F%8C%E5%90%91%E6%96%87%E6%9C%AC%E5%88%B0trojan-source%E7%9A%84%E4%BE%9B%E5%BA%94%E9%93%BE%E6%9A%97%E6%88%98/</link>
      <pubDate>Sat, 07 Mar 2026 20:40:59 +0800</pubDate>
      <guid>https://answer.freetools.me/%E4%B8%80%E8%A1%8C%E7%9C%8B%E4%B8%8D%E8%A7%81%E7%9A%84%E5%AD%97%E7%AC%A6%E5%A6%82%E4%BD%95%E8%AE%A9%E7%BC%96%E8%AF%91%E5%99%A8%E8%83%8C%E5%8F%9B%E4%BD%A0%E4%BB%8Eunicode%E5%8F%8C%E5%90%91%E6%96%87%E6%9C%AC%E5%88%B0trojan-source%E7%9A%84%E4%BE%9B%E5%BA%94%E9%93%BE%E6%9A%97%E6%88%98/</guid>
      <description>深入解析Unicode双向文本(Bidi)算法如何被滥用于Trojan Source攻击，通过Bidi控制字符让源代码在人类视觉和编译器解析之间产生致命分歧。文章涵盖Bidi算法的技术原理、隔离混洗攻击、三种主要利用技术（早期返回、注释隐藏、字符串拉伸）、同形字攻击变体，以及GCC、Clang、GitHub等工具的防御方案。</description>
    </item>
  </channel>
</rss>
