程式作业代写_ Lab 6: Constraint-Based Analysis

Lab 6: Constraint-Based Analysis

C 程序编写代写 Assume that there is no function call to a function with a void return type. You must handle the function calls to tainted_input and

Synopsis

Writing a constraint-based static analysis for C programs with LLVM and Z3.

Objective  C 程序编写代写

In this lab, you will implement a constraint-based analysis to detect exploitable divide-by-zero
bugs. A bug is exploitable if hackers can control inputs or environments, thereby triggering
unintended behaviors (e.g., denial-of-service) through the bug. For example, a recently reported
divide-by-zero bug in the Linux kernel can be exploitable and crash the system. You will design
a static analysis that detects such bugs by combining reaching definition analysis and taint
analysis on top of a constraint solver, Z3.

Setup

The skeleton code for Lab 6 is located under /cis547vm/lab6/. We will frequently refer to the
top level directory for Lab 6 as lab6 when describing file locations for the lab.
The following commands setup the lab:

C 程序编写代写

The above command will generate an executable file constraint that checks whether the input
program has an exploitable divide-by-zero bug:

C 程序编写代写

If you’ve done everything correctly up to this point you should see Potential divide-by-zero points:.

Lab Instructions

In this lab, you will design a reaching definition analysis and taint analysis using Z3. The main tasks are to design the analysis in the form of Datalog rules through the Z3 C++ API, and implement a function that extracts logical constraints in the form of Datalog facts for each LLVM instruction. We will then feed these constraints, along with your Datalog rules, into the Z3 solver which should report any exploitable divide-by-zero errors. The main function of src/Constraint.cpp ties this logic together.

In short, the lab consists of the following tasks:


  1. Write Datalog rules in the initialize function in Extractor.cpp to define the reaching definition analysis and taint analysis.

  2. Write the extractContraints function in Extractor.cpp that extracts Datalog facts from LLVM IR Instruction.
    Relations for Datalog Analysis. The skeleton code provides the definitions of necessary Datalog relations over LLVM IR in Extractor.h. In the following subsection, we will show how to represent LLVM IR programs using these relations.

The relations for def and use of variables are as follows:  C 程序编写代写

● Def(X,Y): Variable X is defined at instruction Y.
● Use(X,Y): Variable X is used at instruction Y.

The relations for the reaching definition analysis are as follows:

● Kill(X,Y): Instruction X kills definition at instruction Y.
● Next(X,Y): Instruction Y is an immediate successor of instruction X.
● In(X,Y): Definition at instruction Y may reach the program point just before instruction X.
● Out(X,Y): Definition at instruction Y may reach the program point just after instruction X.

Note that the Kill relation can be derived by using the Def relation by writing a Datalog rule. The relations for the taint analysis are as follows:

● Taint(X) : There exists a function call at intruction X that reads a tainted input.
● Edge(X,Y): There exists an immediate data-flow from instruction X to instruction Y.
● Path(X,Y): There exists a transitive tainted data-flow from instruction X to instruction Y.
● Sanitizer(X) : There exists a function call at intruction X that sanitizes a tainted input.
● Div(X,Y) : There exists a division operation at instruction Y whose divisor is variable X.
● Alarm(X) : There exists a potential exploitable divide-by-zero error at instruction X.

Assume that input programs may contain function calls to tainted_input and sanitizer that read and sanitize a tainted input, respectively. The final output relation for potential bug reports is Alarm.
You will use these relations to build rules for the definition analysis and taint analysis in Extractor.cpp.

Encoding LLVM Instruction in Datalog. Recall that, in LLVM IR, values and instructions are interchangable. Therefore, all variables X, Y, and Z are an instance of LLVM’s Value class.
Assume that input C programs do not have pointer variables. Therefore, we abuse pointer variables in LLVM IR as their dereference expressions. Consider the following simplified LLVM program from a simple C program int x = 0; int y = x;:

We ignore alloca instructions and consider that each store instruction defines the second argument. In the case of the above example, you should have Def(I0,I2), because x corresponds to x in LLVM IR. Likewise, consider each load instruction uses the argument. In the example, you should have Use(I0,I3) and Def(I3,I3) because load instructions define a non-pointer variable which is represented as the instruction itself in LLVM. Finally, you should have Use(I3,I4) and Def(I1,I4) for instruction I4.

Defining Datalog Rules from C++ API. You will write your Datalog rules in the function initialize using the relations above. Consider an example Datalog rule: A(X, Y) :- B(X, Z), C(Z, Y).

This rule corresponds to the following formula:  C 程序编写代写

∀?, ?, ?. ?(?, ?) ∧ ?(?, ?) ⇒ ?(?, ?).

In Z3, you can specify the formula in the following sequence of APIs in initialize:

C 程序编写代写

You might take a look at the important classes including expr and fixed point as well as an example of using Z3 C++ API.

Extracting Datalog Facts. You will need to implement the function extractConstraints in Extractor.cpp to extract Datalog facts for each LLVM instruction. The skeleton code provides a couple of auxiliary functions in lab6/src/Extract.cpp and lab6/src/Utils.cpp help you with this task:
- void addX(const InstMapTy &InstMap, ...)
- X denotes the name of a relation. These functions add a fact of X to the solver. It takes InstMap that encodes each LLVM instruction as an integer. This map is initialized in the main function.
- vector<Instruction*> getPredecessors(Instruction *I)
- Returns a set of predecessors of a given LLVM instruction I.
- bool isTaintedInput(CallInst *CI)
- Checks whether a given LLVM call instruction CI reads a tainted input or not.
- bool isSanitizer(CallInst *CI)
- Checks whether a given LLVM call instruction CI sanitizes a tainted input or not.

Miscellaneous. For easy debugging, you can use the print function in Extract.cpp. If the -d option is passed through the command line (e.g., constraint simple0.ll -d), it will print out tuples of several relations. You can extend the function for your purpose.

Format of Input Programs

Input programs in this lab are assumed to have only sub-features of the C language as follows:
- All values are integers (i.e., no floating points, pointers, structures, enums, arrays, etc). You can ignore other types of values.


  • Assume that there is no function call to a function with a void return type. You must handle the function calls to tainted_input and sanitizer in a special way which represents their actions as described previously.

Example Input and Output
Your analyzer should run on LLVM IR. For example:

C 程序编写代写

If the input program has exploitable divide-by-zero errors, it should print out the corresponding LLVM instructions.

Items to Submit  C 程序编写代写

Submit file Extractor.cpp via Gradescope.

霍华德社区学院代写

更多代写: HomeWork cs作业     金融代考    postgreSQL代写         IT assignment代写     统计代写     霍华德社区学院代写

发表回复

客服一号:点击这里给我发消息
客服二号:点击这里给我发消息
微信客服1:essay-kathrine
微信客服2:essay-gloria