ucsb-seclab / karonte

Karonte is a static analysis tool to detect multi-binary vulnerabilities in embedded firmware
BSD 2-Clause "Simplified" License
384 stars 61 forks source link

Does this tool handle aarch64 binaries? #8

Closed behnamben closed 3 years ago

behnamben commented 3 years ago

Does your dataset include firmware for ARMv8 processors? and if there is, how it performed on them? I'm asking this question because the addressing mechanism in aarch64 binaries is different where the program counter register no longer exists instead there are address pages. when I was testing angr against handcrafted programs based on aarch64 binaries, it couldn't construct a proper CFG and DDG and.

badnack commented 3 years ago

Hi, karonte is based on angr, and it does support aarch64. However, if you are experiencing some issues with angr with some aarch64 binaries, you ll experience similar problems with karonte too on the same binaries.

On Tue, Oct 27, 2020, 6:51 PM behnam notifications@github.com wrote:

Does your dataset include firmware for ARMv8 processors? and if there is, how it performed on them? I'm asking this question because the addressing mechanism in aarch64 binaries is different where the program counter register no longer exists instead there are address pages. when I was testing angr against handcrafted programs based on aarch64 binaries, it couldn't construct a proper CFG and DDG and.

— You are receiving this because you are subscribed to this thread. Reply to this email directly, view it on GitHub https://github.com/ucsb-seclab/karonte/issues/8, or unsubscribe https://github.com/notifications/unsubscribe-auth/AAH5GZAYTWI3XWCXNG6N5L3SM52J5ANCNFSM4TBVFOUQ .