-
Notifications
You must be signed in to change notification settings - Fork 10
Assignment 3
$tree Assignment-3
├── Assignment-3-Helper.cpp
├── Assignment-3.cpp
├── Assignment-3.h
├── CMakeLists.txt
└── Tests
├── CMakeLists.txt
├── ae
│ ├── test1.c
│ ├── test1.ll
│ ├── test2.c
│ ├── test2.ll
│ ├── test3.c
│ ├── test3.ll
│ ├── test4.c
│ ├── test4.ll
│ ├── test5.c
│ ├── test5.ll
│ ├── test6.c
│ └── test6.ll
├── buf
│ ├── test1.c
│ ├── test1.ll
│ ├── test2.c
│ └── test2.ll
└── test-ae.cpp
* Before coding, please type cd $HOME/Software-Security-Analysis
and git pull
in your terminal to make sure you always have the latest version of the code template before each assignment.
Make sure to switch your program to ass3
before coding.
Method | Description | Marks |
---|---|---|
updateStateOnCopy |
Handle COPYStmt | 10% |
updateStateOnStore |
Handle StoreStmt | 10% |
updateStateOnLoad |
Handle LoadStmt | 10% |
updateStateOnGep |
Handle GepStmt | 10% |
updateStateOnBinary |
Handle BinaryStmt. | 10% |
updateStateOnPhi |
Handle PhiStmt. | 10% |
bufOverflowDetection |
Check bufferoverflow at GepStmt. | 20% |
handleCycleWTO |
Widening and narrowing for loops. | 20% |
- Implement the above methods of class
AbstractExecution
inAssignment-3.cpp
- Run
ctest -R ass3 -VV
Pass the test without any assertion bytest-ae.cpp
. - Upload
Assignment-3.cpp
to UNSWWebCMS
for your submission when you are finished with this assignment. Your implementation will be evaluated against our internal tests. You will get full marks if your code can pass them all. Here, we only provided several simple test cases underAssignment-3/Tests/ae
for assertion validation andAssignment-3/Tests/buf
for buffer overflow detection. You are encouraged to add more test cases by yourself to validate the correctness of your implementation.
*You will be working on Assignment-3.cpp
only and there is NO need to modify other files under the Assignment-3 folder
SVF AE API to help with your implementation.
The updateStateOnStore
function should store the RHS value at the memory address corresponding to the LHS value in AEState
which is from calling getAbsStateFromTrace
. Note that the RHS variable can be either IntervalValue
or AddressValue
.
The updateStateOnGep
function aims to compute the virtual address by adding an offset to the base pointer and then store the updated state in LHS value in AEState
which is from calling getAbsStateFromTrace
.
The updateStateOnCopy
function should copy the RHS value to the LHS value in AEState
which is from calling getAbsStateFromTrace
.
The updateStateOnBinary
function should perform the binary operation specified by the BinaryStmt
and store the result in the LHS value in AEState
which is from calling getAbsStateFromTrace
.
The updateStateOnLoad
function should load the value from the memory address corresponding to the RHS value and store it in the LHS value in AEState
which is from calling getAbsStateFromTrace
.
The updateStateOnPhi
function should merge the values from the predecessor blocks and store the merged value in the LHS value in AEState
which is from calling getAbsStateFromTrace
.
The handleCycleWTO function needs to include widening and narrowing logic. This will enable the function to handle loop bounds efficiently (e.g., for i = 0; i < 10000; ++i
), allowing it to exit the loop after several iterations and determine the correct value of i.
This function takes an SVFStmt
as input. If the statement is a GepStmt
, it indicates an attempt to access an offset of a pointer or array. An overflow checking is needed to make sure the access offset is smaller than the size of the underlying object.
The provided framework already includes the following steps:
- Identifying if the statement is a
GepStmt
. - Using the
updateGepObjOffsetFromBase
function to update the offsets for the GEP objects.
You need to complete the following tasks:
-
Check Object Sizes and Access Offsets: After updating the offsets using
updateGepObjOffsetFromBase
, you need to check if the access offset exceeds the effective byte size of the object. - Report Buffer Overflow: If an access offset is found to exceed the object's size, you should report a buffer overflow.
Specifically, in the bufOverflowDetection
function, you need to:
- Retrieve the base address and size of the object.
- Get the access offset.
- Compare the access offset with the object's size. If the offset exceeds the size, report a buffer overflow.
Ensure you use the provided tools and functions correctly to perform these checks and report any buffer overflows.
It is important to note that a buffer overflow bug may occur during a GepStmt
. For example:
int arr[5];
arr[10] = 1;
A buffer overflow might also occur after multiple GepStmt
s, such as:
int arr[5];
int* ptr = arr + 3;
ptr[4] = 1;
Therefore, each GepStmt
must be checked to ensure that the RHS variable's effective length still supports the current offset. If a bug is detected, invoke reportBufOverflow
to report a bug.
3.1 launch.json
To enable debugging and running, switch your executable by setting the program
and args
fields as described here or follow the below screenshot.
If you want to see the value of AbstractValue
, you can call toString()
to print the value (either IntervalValue
or AddressValue
).
int main() {
AbstractValue a = IntervalValue(1, 1);
std::cout << a.toString() << std::end;
}