A command-line tool that analyzes binary files to detect enabled security and sanitizing features. Helpful for debugging coverage guided-fuzzing problems.
The project is hosted on GitHub: Binary Security Checker
Clone the repository using:
git clone https://github.com/FHNW-Security-Lab/Sanitizing-Checker.git
To run the Binary Security Checker, use the following command:
python3 sanitizing-checker.py <binary>
The test
folder contains sample binaries to try out the tool. Navigate to the test
folder and run main
to experiment with these samples.
cd test
make
cd ..
Running the tool on a binary will produce output similar to this:
$ python3 sanitizing-checker.py test/security_all_on
Security Features Analysis for: test/security_all_on
----------------------------------------
ASLR: Enabled
NX/DEP: Enabled
PIE: Enabled
RELRO: Enabled
Stack Protection: Enabled
Sanitizer Features:
----------------------------------------
AddressSanitizer: Disabled
ThreadSanitizer: Disabled
MemorySanitizer: Disabled
UBSan: Disabled
Coverage Features:
----------------------------------------
Function: Disabled
Basic Block: Disabled
Edge: Disabled
Trace: Disabled (None)
Note: Only the trace coverage feature is currently tested.
This project is licensed under BSD 3-Clause Licence.