-
Notifications
You must be signed in to change notification settings - Fork 11
Open
Labels
enhancementNew feature or requestNew feature or request
Description
We have three sources for vulnerabilities experimentation with SLUMPs:
- Memory disclosures from find 3 reproducible attacks on WASM programs #7 (C code here)
- Whitebox cryptographic programs mentioned in add white box crypto into benchmark #27
- CVEs report for webassembly mentioned in CVEs in Webassembly #41
- TODO: Collect specific CVEs to test
Experiment steps:
1 - Port the vulnerable code to WebAssembly using SLUMPs and collecting the original program without optimizations
2 - See if the problem persists in the V8 context (already tested in #7 with emcc)
- Try to execute in the browser
- Collect the profiler information from the DevTool
- Execute the same WASM code in SWAM and collect stack and memory traces
3 - Feed SLUMPs with the vulnerable program
4 - Collect variants
- For each variant: apply step 2
Notes
In the case of the CVEs, we also need to test if the CVEs related to Binaryen persist after the SLUMPs phase
Use the dockerized SLUMPs app
For example
docker run -it --rm -v $(pwd)/out:/slumps/src/out jacarte/slumps:app https://raw.githubusercontent.com/KTH/slumps/master/benchmark_programs/rossetta/valid/no_input/Catalan_numbers.c Catalan_numbers.c
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
enhancementNew feature or requestNew feature or request