Merge pull request #216 from trailofbits/dev-angora-frontend
Add Angora front-end with fuzzer front-end API
This commit is contained in:
commit
a7ae8e8991
125
bin/deepstate/angora.py
Normal file
125
bin/deepstate/angora.py
Normal file
@ -0,0 +1,125 @@
|
|||||||
|
#!/usr/bin/env python
|
||||||
|
# Copyright (c) 2019 Trail of Bits, Inc.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
# you may not use this file except in compliance with the License.
|
||||||
|
# You may obtain a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
# See the License for the specific language governing permissions and
|
||||||
|
# limitations under the License.
|
||||||
|
|
||||||
|
import os
|
||||||
|
import sys
|
||||||
|
import argparse
|
||||||
|
|
||||||
|
from .frontend import DeepStateFrontend
|
||||||
|
|
||||||
|
class Angora(DeepStateFrontend):
|
||||||
|
|
||||||
|
|
||||||
|
@classmethod
|
||||||
|
def parse_args(cls):
|
||||||
|
parser = argparse.ArgumentParser(description="Use Angora as back-end for DeepState.")
|
||||||
|
|
||||||
|
compile_group = parser.add_argument_group("compilation and instrumentation arguments")
|
||||||
|
compile_group.add_argument("--compile_test", type=str, help="Path to DeepState test harness for compilation.")
|
||||||
|
compile_group.add_argument("--ignored_taints", type=str, help="Path to ignored function calls for taint analysis.")
|
||||||
|
compile_group.add_argument("--compiler_args", default=[], nargs='+', help="Compiler flags (excluding -o) to pass to compiler.")
|
||||||
|
compile_group.add_argument("--out_test_name", type=str, default="test", help="Set name for generated *.taint and *.fast binaries.")
|
||||||
|
|
||||||
|
parser.add_argument("taint_binary", type=str, help="Path to binary compiled with taint tracking.")
|
||||||
|
parser.add_argument("--mode", type=str, default="llvm", help="Specifies binary instrumentation framework used (either llvm or pin).")
|
||||||
|
parser.add_argument("--no_afl", action='store_true', help="Disables AFL mutation strategies being used.")
|
||||||
|
parser.add_argument("--no_exploration", action='store_true', help="Disables context-sensitive input bytes mutation.")
|
||||||
|
|
||||||
|
cls.parser = parser
|
||||||
|
return super(Angora, cls).parse_args()
|
||||||
|
|
||||||
|
|
||||||
|
def compile(self):
|
||||||
|
args = self._args
|
||||||
|
no_taints = args.ignored_taints
|
||||||
|
|
||||||
|
env = os.environ.copy()
|
||||||
|
|
||||||
|
# set envvar to file with ignored lib functions for taint tracking
|
||||||
|
if no_taints:
|
||||||
|
if os.path.isfile(no_taints):
|
||||||
|
env["ANGORA_TAINT_RULE_LIST"] = os.path.abspath(no_taints)
|
||||||
|
|
||||||
|
# generate instrumented binary
|
||||||
|
fast_args = [args.compile_test] + args.compiler_args + \
|
||||||
|
["-ldeepstate", "-o", args.out_test_name + ".fast"]
|
||||||
|
super().compile(compiler_args=fast_args, env=env)
|
||||||
|
|
||||||
|
# make a binary with taint tracking information
|
||||||
|
if args.mode == "pin":
|
||||||
|
env["USE_PIN"] = "1"
|
||||||
|
else:
|
||||||
|
env["USE_TRACK"] = "1"
|
||||||
|
|
||||||
|
taint_args = [args.compile_test] + args.compiler_args + \
|
||||||
|
["-ldeepstate", "-o", args.out_test_name + ".taint"]
|
||||||
|
super().compile(compiler_args=taint_args, env=env)
|
||||||
|
return 0
|
||||||
|
|
||||||
|
|
||||||
|
def main():
|
||||||
|
fuzzer = Angora("angora_fuzzer", compiler="bin/angora-clang++", envvar="ANGORA")
|
||||||
|
args = fuzzer.parse_args()
|
||||||
|
|
||||||
|
if args.compile_test:
|
||||||
|
print("COMPILING DEEPSTATE HARNESS FOR FUZZING...")
|
||||||
|
fuzzer.compile()
|
||||||
|
sys.exit(0)
|
||||||
|
|
||||||
|
# we do not require for the sake of the compilation arg group
|
||||||
|
if not args.seeds or not args.output_test_dir:
|
||||||
|
print("Error: --seeds and/or --output_test_dir required for fuzzing.")
|
||||||
|
sys.exit(1)
|
||||||
|
|
||||||
|
seeds = os.path.abspath(args.seeds)
|
||||||
|
|
||||||
|
if args.fuzzer_help:
|
||||||
|
fuzzer.print_help()
|
||||||
|
sys.exit(0)
|
||||||
|
|
||||||
|
if not os.path.exists(seeds):
|
||||||
|
print("CREATING INPUT SEED DIRECTORY...")
|
||||||
|
os.mkdir(seeds)
|
||||||
|
|
||||||
|
if len([name for name in os.listdir(seeds)]) == 0:
|
||||||
|
print("Error: no seeds present in directory", args.seeds)
|
||||||
|
sys.exit(1)
|
||||||
|
|
||||||
|
cmd_dict = {
|
||||||
|
"--time_limit": str(args.timeout),
|
||||||
|
"--mode": args.mode,
|
||||||
|
"--input": seeds,
|
||||||
|
"--output": args.output_test_dir,
|
||||||
|
"--jobs": str(args.jobs),
|
||||||
|
"--track": os.path.abspath(args.taint_binary),
|
||||||
|
}
|
||||||
|
|
||||||
|
if args.no_afl:
|
||||||
|
cmd_dict['--disable_afl_mutation'] = None
|
||||||
|
|
||||||
|
if args.no_exploration:
|
||||||
|
cmd_dict['--disable_exploitation'] = None
|
||||||
|
|
||||||
|
cmd_dict['--'] = os.path.abspath(args.binary)
|
||||||
|
|
||||||
|
fuzzer.cli_command(cmd_dict, cli_other=args.args)
|
||||||
|
|
||||||
|
print("EXECUTING FUZZER...")
|
||||||
|
fuzzer.execute_fuzzer()
|
||||||
|
return 0
|
||||||
|
|
||||||
|
|
||||||
|
if __name__ == "__main__":
|
||||||
|
exit(main())
|
||||||
@ -46,8 +46,8 @@ class DeepStateFrontend(object):
|
|||||||
compiler_paths = [f"{path}/{compiler}" for path in potential_paths if os.path.isfile(path + '/' + compiler)]
|
compiler_paths = [f"{path}/{compiler}" for path in potential_paths if os.path.isfile(path + '/' + compiler)]
|
||||||
if len(compiler_paths) == 0:
|
if len(compiler_paths) == 0:
|
||||||
|
|
||||||
# check to see if user supplied absolute path
|
# check to see if user supplied absolute path or compiler resides in PATH
|
||||||
if os.path.is_file(compiler):
|
if os.path.isfile(compiler):
|
||||||
self.compiler = compiler
|
self.compiler = compiler
|
||||||
else:
|
else:
|
||||||
raise RuntimeError(f"{compiler} does not exist as absolute path or in ${envvar}")
|
raise RuntimeError(f"{compiler} does not exist as absolute path or in ${envvar}")
|
||||||
@ -73,21 +73,31 @@ class DeepStateFrontend(object):
|
|||||||
subprocess.call([self.fuzzer, "--help"])
|
subprocess.call([self.fuzzer, "--help"])
|
||||||
|
|
||||||
|
|
||||||
def compile(self, flags):
|
def compile(self, compiler_args=None, custom_cmd=None, env=os.environ.copy()):
|
||||||
"""
|
"""
|
||||||
provides an interface for calling a compiler to instrument a test harness for
|
provides a simple interface for calling a compiler to instrument a test harness for
|
||||||
mutation-based fuzzers
|
mutation-based fuzzers
|
||||||
"""
|
"""
|
||||||
if self.compiler is None:
|
if self.compiler is None:
|
||||||
raise RuntimeError(f"No compiler specified for compile-time instrumentation.")
|
raise RuntimeError(f"No compiler specified for compile-time instrumentation.")
|
||||||
|
|
||||||
self.compile_cmd = [self.compiler, flags]
|
os.environ["CC"] = self.compiler
|
||||||
|
os.environ["CCX"] = self.compiler
|
||||||
|
|
||||||
try:
|
try:
|
||||||
subprocess.call(self.compile_cmd)
|
if custom_cmd is not None:
|
||||||
|
compile_cmd = custom_cmd
|
||||||
|
else:
|
||||||
|
compile_cmd = [self.compiler] + compiler_args
|
||||||
|
|
||||||
|
ps = subprocess.Popen(compile_cmd, env=env)
|
||||||
|
ps.communicate()
|
||||||
|
|
||||||
except BaseException as e:
|
except BaseException as e:
|
||||||
raise RuntimeError(f"{self.compiler} interrupted due to exception:", e)
|
raise RuntimeError(f"{self.compiler} interrupted due to exception:", e)
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
def cli_command(self, cmd_dict, compiler=None, cli_other=None):
|
def cli_command(self, cmd_dict, compiler=None, cli_other=None):
|
||||||
"""
|
"""
|
||||||
provides an interface for constructing proper command to be passed
|
provides an interface for constructing proper command to be passed
|
||||||
@ -135,6 +145,9 @@ class DeepStateFrontend(object):
|
|||||||
if cls._ARGS:
|
if cls._ARGS:
|
||||||
return cls._ARGS
|
return cls._ARGS
|
||||||
|
|
||||||
|
if hasattr(cls, "parser"):
|
||||||
|
parser = cls.parser
|
||||||
|
else:
|
||||||
parser = argparse.ArgumentParser(
|
parser = argparse.ArgumentParser(
|
||||||
description="Use fuzzer as back-end for DeepState.")
|
description="Use fuzzer as back-end for DeepState.")
|
||||||
|
|
||||||
@ -144,6 +157,8 @@ class DeepStateFrontend(object):
|
|||||||
|
|
||||||
parser.add_argument("--timeout", type=int, default=3600, help="How long to fuzz.")
|
parser.add_argument("--timeout", type=int, default=3600, help="How long to fuzz.")
|
||||||
|
|
||||||
|
parser.add_argument("--jobs", type=int, default=1, help="How many worker processes to spawn.")
|
||||||
|
|
||||||
parser.add_argument("--seeds", type=str, help="Directory with seed inputs.")
|
parser.add_argument("--seeds", type=str, help="Directory with seed inputs.")
|
||||||
|
|
||||||
parser.add_argument("--which_test", type=str, help="Which test to run (equivalent to --input_which_test).")
|
parser.add_argument("--which_test", type=str, help="Which test to run (equivalent to --input_which_test).")
|
||||||
@ -154,5 +169,6 @@ class DeepStateFrontend(object):
|
|||||||
|
|
||||||
parser.add_argument("--args", default=[], nargs=argparse.REMAINDER, help="Other arguments to pass to fuzzer cli.")
|
parser.add_argument("--args", default=[], nargs=argparse.REMAINDER, help="Other arguments to pass to fuzzer cli.")
|
||||||
|
|
||||||
cls._ARGS = parser.parse_args()
|
cls._args = parser.parse_args()
|
||||||
return cls._ARGS
|
cls.parser = parser
|
||||||
|
return cls._args
|
||||||
|
|||||||
@ -38,5 +38,6 @@ setuptools.setup(
|
|||||||
'deepstate-manticore = deepstate.main_manticore:main',
|
'deepstate-manticore = deepstate.main_manticore:main',
|
||||||
'deepstate-reduce = deepstate.reducer:main',
|
'deepstate-reduce = deepstate.reducer:main',
|
||||||
'deepstate-eclipser = deepstate.eclipser:main',
|
'deepstate-eclipser = deepstate.eclipser:main',
|
||||||
|
'deepstate-angora = deepstate.angora:main'
|
||||||
]
|
]
|
||||||
})
|
})
|
||||||
|
|||||||
@ -38,6 +38,10 @@ RUN apt-get update \
|
|||||||
&& apt-get update \
|
&& apt-get update \
|
||||||
&& apt-get install -y dotnet-sdk-2.2
|
&& apt-get install -y dotnet-sdk-2.2
|
||||||
|
|
||||||
|
# Install Angora dependencies
|
||||||
|
RUN apt-get install -y rustc \
|
||||||
|
&& apt-get install -y cargo
|
||||||
|
|
||||||
# Install DeepState/AFL/libFuzzer dependencies
|
# Install DeepState/AFL/libFuzzer dependencies
|
||||||
RUN apt-get update \
|
RUN apt-get update \
|
||||||
&& apt-get install -y build-essential \
|
&& apt-get install -y build-essential \
|
||||||
@ -64,7 +68,15 @@ RUN git clone https://github.com/SoftSec-KAIST/Eclipser \
|
|||||||
&& make \
|
&& make \
|
||||||
&& cd ../
|
&& cd ../
|
||||||
|
|
||||||
# Install DeepState using a few different compilers for AFL/libFuzzer/Eclipser+normal
|
# Install Angora
|
||||||
|
RUN git clone https://github.com/AngoraFuzzer/Angora \
|
||||||
|
&& cd Angora \
|
||||||
|
&& ./build/build.sh \
|
||||||
|
&& cd ../
|
||||||
|
|
||||||
|
ENV ANGORA=/home/user/Angora
|
||||||
|
|
||||||
|
# Install DeepState using a few different compilers for AFL/libFuzzer/Eclipser/Angora+normal
|
||||||
RUN cd deepstate \
|
RUN cd deepstate \
|
||||||
&& rm -Rf CMakeFiles CMakeCache.txt \
|
&& rm -Rf CMakeFiles CMakeCache.txt \
|
||||||
&& rm -Rf build \
|
&& rm -Rf build \
|
||||||
@ -76,6 +88,9 @@ RUN cd deepstate \
|
|||||||
&& rm -rf CMakeFiles CMakeCache.txt \
|
&& rm -rf CMakeFiles CMakeCache.txt \
|
||||||
&& CXX=clang++ CC=clang BUILD_LIBFUZZER=TRUE cmake ../ \
|
&& CXX=clang++ CC=clang BUILD_LIBFUZZER=TRUE cmake ../ \
|
||||||
&& sudo make install \
|
&& sudo make install \
|
||||||
|
&& rm -rf CMakeFiles CMakeCache.txt \
|
||||||
|
&& CXX=$ANGORA/bin/angora-clang++ CC=$ANGORA/bin/angora-clang cmake ../ \
|
||||||
|
&& export USE_TRACK=1 && sudo -E bash -c 'make -i install' \
|
||||||
&& cd .. \
|
&& cd .. \
|
||||||
&& sudo pip3 install 'z3-solver==4.5.1.0.post2' angr 'manticore==0.2.5' \
|
&& sudo pip3 install 'z3-solver==4.5.1.0.post2' angr 'manticore==0.2.5' \
|
||||||
&& sudo python3 ./build/setup.py install
|
&& sudo python3 ./build/setup.py install
|
||||||
|
|||||||
Loading…
x
Reference in New Issue
Block a user