BukowskiA project for demonstrating popular security solutions' flaws | |
Download |
Bukowski Ranking & Summary
Advertisement
Bukowski Tags
Bukowski Description
A project for demonstrating popular security solutions' flaws Bukowski was created to demonstrate that today's most used security solutions like DAC or VMA randomization are not enough; thus, other approaches (like MAC or design by contract) should be seriously taken in consideration. What's New in This Release: · The major change here is that it's now possible to do basic instruction substitution. The example in grammar.xml is not fully functional because I've only added a "negate" operation so far. However, there's plenty of rules that can be written for x86-32 using basic instruction substitution. · As soon as more operations (including constraints) are added, significantly more will be possible. On the other hand, there's plenty of more work to do. For one thing, a lot of this needs some serious refactoring. I'm considering this version of the engine to be a rather rough prototype. Also, rule composition isn't possible yet either (for making rules out of non-terminals). · So, althogh this is very "prototypy", we're well on our way to having a fully-functional grammar-based instruction mutation engine.
Bukowski Related Software