Skip to content

Commit 56584e0

Browse files
Update README.md
1 parent 8168eb0 commit 56584e0

File tree

1 file changed

+8
-2
lines changed

1 file changed

+8
-2
lines changed

README.md

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,6 +8,12 @@ Analysis Steps of UbSym
88
* Monte Carlo Simulation and Curve Fitting
99
* Detecting Vulnerability and Generating Appropriate Inputs for Activating of the Vulnerability
1010

11+
## Supported Vulnerabilities
12+
- [x] Heap-Based Buffer Overflow
13+
- [x] Stack-Based Buffer Overflow
14+
- [x] Double-Free
15+
- [x] Use-After-Free
16+
1117
## Requirements
1218
- Python3
1319
- angr Framework ([Installation](https://angr.io))
@@ -49,12 +55,12 @@ You can see possibly vulnerable units contaning double-free vulnerability in a b
4955
chmod +x run.py; ./run.py -b program -t DF
5056
```
5157
For example, you want to analyze the function "CWE415_Double_Free__malloc_free_int_01_bad" as a vulnerable unit:<br />
52-
We need one argument with the maximum length of 100 as the input "argv", making the possible vulnerability active in the "CWE415_Double_Free__malloc_free_int_01_bad" unit, so we use `-s 100` for the sizes option and `-a 1` for the args option.
58+
We need one argument with the maximum length of 100 bytes as the input "argv", making the possible vulnerability active in the "CWE415_Double_Free__malloc_free_int_01_bad" unit, so we use `-s 100` for the sizes option and `-a 1` for the args option.
5359
```
5460
./run.py -b program -t DF -p 'void CWE415_Double_Free__malloc_free_int_01_bad(char*)' -s 100 -a 1
5561
```
5662
### Results
57-
Compile programs using [`executable.sh`](https://github.com/SoftwareSecurityLab/UbSym/blob/main/tests/executable.txt) script and run [`benchmarks_running.py`](https://github.com/SoftwareSecurityLab/UbSym/blob/main/benchmarks_running.py) file to analyze all programs of tests directory.
63+
Compile programs using [`executable.sh`](https://github.com/SoftwareSecurityLab/UbSym/blob/main/tests/executable.sh) script and run [`benchmarks_running.py`](https://github.com/SoftwareSecurityLab/UbSym/blob/main/benchmarks_running.py) file to analyze all programs of tests directory.
5864
```
5965
chmod +x ./tests/executable.sh; ./tests/executable.sh
6066
chmod +x benchmarks_running.py; ./benchmarks_running.py

0 commit comments

Comments
 (0)