Reverse engineering folks: what would you use to efficiently instrument a binary (not source)? I need to record the CPU flags in dozens of locations during execution and I don't want to rewrite jumps manually, etc. Linux only ok.
Sorry, I don't have much to add. It just sounded like an interesting class of bug from what you asked about, and I wondered if such bugs actually exist (seems unlikely from a compiler unless inline asm constraints were botched).
-
-
(I am testing handwritten constant time crypto assembly.)
-
If it's a piece of handwritten crypto assembly that you want to interact with (no syscalls whatsoever) and you like python, consider Unicorn. There's AFL-Unicorn for fuzzing that might be just the tool https://github.com/Battelle/afl-unicorn … (there's also a go userland https://github.com/lunixbochs/usercorn …)
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.