Skip to content

Running sample_app

Toshi Piazza edited this page Mar 3, 2018 · 1 revision

sample_app is a simple application of taint analysis which taints pointers on process startup and when they are introduced into the system via mmap2 or brk. We can run it like this:

$ LD_BIND_NOW=1 drrun -c ./libdrtaint.so $(python ./scripts/relocs.py /bin/ls) -- /bin/ls

We must specify LD_BIND_NOW to force all GOT relocations to occur immediately by the loader (unless RELRO is specified as FULL for the application or it's statically compiled) so we may taint them on the first application instruction. In the future we may support hooking __dl_runtime_resolve() and we will not have this restriction; we will be able to taint GOT entries lazily as well.

Clone this wiki locally