Skip to content

cd-public/Astarte

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 
 
 

Repository files navigation

README

Supporting files for the Astarte tool.

Python Scripts

This is a snapshot of the constellation of scripts that comprise Daikon front end and post processor that accepted as input the debug information from a Qemu run and produce as output "human readable" properties, which contain the necessary properties to block any of the exploits seen in Michael's thesis.

The snapshots are from 5 Sept 2019. I do have versions of these files I was iterating over up to 7 Nov 2019, but this snapshot was preserved as the paper was written from it (it was the first to have the coverage I was hoping for). The level of documentation is a bit sparse due to deadline pressure, but the toolchain flow sketch is:

uniq_insts: qemu debug -> decls

utility function to define program points, not used directly.

in_parse: qemu debug -> dtrace

first pass frontend, for security labels.

in_one: qemu debug -> dtrace

second pass frontend, for security properties.

split: daikon output -> spinfo

first pass analyzer and second pass front end auxiliary, generates preconditions

moder: daikon output -> plain text, less readable

find modes from Daikon output

inter: plain text, less readable -> plain text, more readable

simplify modes from Daikon out

"ref"

This is the working document I used while drafting the Astarte paper. It is the output of the toolchain process with my manual annotations to help keep track of what the different bits mean.

Who do I talk to?

Acknowledgements

This material is based upon work supported by the National Science Foundation under Grants No. CNS-1651276 and CNS-1816637, by the Semiconductor Research Corporation, Intel, and by a Google Faculty Research Award.

Releases

No releases published

Packages

No packages published

Languages