Skip to content

Latest commit

 

History

History
73 lines (48 loc) · 1.65 KB

README.md

File metadata and controls

73 lines (48 loc) · 1.65 KB

Binary Sanitizing and Security Checker

A command-line tool that analyzes binary files to detect enabled security and sanitizing features. Helpful for debugging coverage guided-fuzzing problems.

Repository

The project is hosted on GitHub: Binary Security Checker

Clone the repository using:

git clone https://github.com/FHNW-Security-Lab/Sanitizing-Checker.git

Usage

To run the Binary Security Checker, use the following command:

python3 sanitizing-checker.py <binary>

Testing with Sample Binaries

The test folder contains sample binaries to try out the tool. Navigate to the test folder and run main to experiment with these samples.

cd test
make
cd ..

Example Output

Running the tool on a binary will produce output similar to this:

$ python3 sanitizing-checker.py test/security_all_on

Security Features Analysis for: test/security_all_on
----------------------------------------
ASLR:                  Enabled
NX/DEP:                Enabled
PIE:                   Enabled
RELRO:                 Enabled
Stack Protection:      Enabled

Sanitizer Features:
----------------------------------------
AddressSanitizer:     Disabled
ThreadSanitizer:      Disabled
MemorySanitizer:      Disabled
UBSan:                Disabled

Coverage Features:
----------------------------------------
Function:             Disabled
Basic Block:          Disabled
Edge:                 Disabled
Trace:                Disabled  (None)

Note: Only the trace coverage feature is currently tested.

License

This project is licensed under BSD 3-Clause Licence.