Product
Introducing License Enforcement in Socket
Ensure open-source compliance with Socket’s License Enforcement Beta. Set up your License Policy and secure your software!
information-flow-analysis
Advanced tools
Angr_information_flow_analysis is an angr IFC analysis tool for unix binaries.
Install using pip install information-flow-analysis
.
analyze
Information Flow Analysis objectimport angr
import claripy
from information_flow_analysis import analysis
def main():
proj = angr.Project('implicit3.out', load_options={'auto_load_libs':False})
sym_arg_size = 15
arg0 = claripy.BVS('arg0', 8*sym_arg_size)
state = proj.factory.entry_state(args=['./implicit3.out', arg0])
high_addrs = [0x4011a6, 0x4011a9]
ifa = analysis.InformationFlowAnalysis(proj=proj,state=state,start="main",high_addrs=high_addrs)
ifa.analyze()
return 0
if __name__ == "__main__":
main()
find_explicit_leaks
Information Flow Analysis objectimport angr
import claripy
from information_flow_analysis import analysis
def main():
proj = angr.Project('implicit3.out', load_options={'auto_load_libs':False})
sym_arg_size = 15
arg0 = claripy.BVS('arg0', 8*sym_arg_size)
state = proj.factory.entry_state(args=['./implicit3.out', arg0])
high_addrs = [0x4011a6, 0x4011a9]
ifa = analysis.InformationFlowAnalysis(proj=proj,state=state,start="main",high_addrs=high_addrs)
ifa.find_explicit_leaks()
return 0
if __name__ == "__main__":
main()
Use out.cfgs()
in order to print all relevant control flow graphs in an seperate /out
folder.
An example of this is could be:
import angr
import claripy
from information_flow_analysis import out
def main():
proj = angr.Project('implicit3.out', load_options={'auto_load_libs':False})
sym_arg_size = 15
arg0 = claripy.BVS('arg0', 8*sym_arg_size)
state = proj.factory.entry_state(args=['./implicit3.out', arg0])
out.cfgs()
return 0
if __name__ == "__main__":
main()
Generally you want to look at the cfg_fast.pdf
as it contains relevant information about instructions. This CFG is also very relevant in order to locate which high_addrs
you will make confidential.
InformationFlowAnalysis
objectUse IFA.draw_everything()
in order to print all relevant graphs contained in the IFA
-object in an seperate /out
folder.
An example of this is could be:
import angr
import claripy
from information_flow_analysis import analysis
def main():
proj = angr.Project('implicit3.out', load_options={'auto_load_libs':False})
sym_arg_size = 15
arg0 = claripy.BVS('arg0', 8*sym_arg_size)
state = proj.factory.entry_state(args=['./implicit3.out', arg0])
high_addrs = [0x4011a6, 0x4011a9]
ifa = analysis.InformationFlowAnalysis(proj=proj,state=state,start="main",high_addrs=high_addrs)
ifa.draw_everything()
return 0
if __name__ == "__main__":
main()
This is primarily used to debugging purposes or if you manually want to check for leaks. (NOTE: That you need to supply high_addrs
in order to do this)
FAQs
Information Flow Control library for binaries using angr
We found that information-flow-analysis demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Product
Ensure open-source compliance with Socket’s License Enforcement Beta. Set up your License Policy and secure your software!
Product
We're launching a new set of license analysis and compliance features for analyzing, managing, and complying with licenses across a range of supported languages and ecosystems.
Product
We're excited to introduce Socket Optimize, a powerful CLI command to secure open source dependencies with tested, optimized package overrides.