Skip to content
forked from HexHive/BOPC

Block Oriented Programming -- Compiler

Notifications You must be signed in to change notification settings

sei-eschwartz/BOPC

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

48 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Overview

This is a fork of BOPC we created to evaluate BOPC in our paper, A Generic Technique for Automatically Finding Defense-Aware Code Reuse Attacks.

More details to be announced.

The primary changes are:

  • Support for 32-bit executables. The original version of BOPC had many 32-bit features hard-coded in (i.e., st.rax vs st.eax) that prevented it from working on 32-bit executables.
  • Addition of the --no-awp option. This option prevents BOPC from using Arbitrary Write Primitives (AWP) and the ability to arbitrary initialize a register. This is useful to see if BOPC really needs these strong assumptions to be able to find an attack.
  • Various bug fixes. Some (but not all) have been merged back to the original BOPC repository.

About

Block Oriented Programming -- Compiler

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 99.4%
  • Shell 0.6%