[英]Can AddressSanitizer (or any other tool) detect memory bugs in Android native code binaries without needing compilation?
Google's AddressSanitizer
detects memory bugs in Android native code. Google 的
AddressSanitizer
在 Android 本机代码中检测到 memory 错误。 It does require , however, that the target binary (ie, executable or library) be recompiled with whatever flags and settings it needs:但是,它确实需要使用它需要的任何标志和设置重新编译目标二进制文件(即可执行文件或库):
AddressSanitizer (ASan) is a fast compiler-based tool for detecting memory bugs in native code.
AddressSanitizer (ASan) 是一种基于编译器的快速工具,用于检测本机代码中的 memory 错误。
Is there a tool that can detect Android memory bugs without requiring any recompilation of the target binary?是否有无需重新编译目标二进制文件即可检测 Android memory 错误的工具? Here are some thoughts of what such a tool would look like:
以下是对此类工具外观的一些想法:
libc.so
(eg, malloc, free, calloc, realloc), similar to Frida 's ability to intercept any native code function.libc.so
、free、calloc、realloc),类似于Frida拦截任何本机代码 function 的能力。 https://github.com/frida/frida-gum https://github.com/frida/frida-gum
Helper libraries for developers needing highly granular:需要高度粒度的开发人员的帮助库:
Heap allocation tracking and leak checking.堆分配跟踪和泄漏检查。
https://github.com/frida/frida-gum/tree/master/libs/gum/heaphttps://github.com/frida/frida-gum/tree/master/libs/gum/heap
Profiling with worst-case inspector callback.使用最坏情况检查器回调进行分析。
https://github.com/frida/frida-gum/blob/7e4c5b547b035ae05d2f9e160652101bf741e6c3/libs/gum/prof/gumprofiler.h#L40-L42 https://github.com/frida/frida-gum/tree/master/libs/gum/prof https://github.com/frida/frida-gum/blob/7e4c5b547b035ae05d2f9e160652101bf741e6c3/libs/gum/prof/gumprofiler.h#L40-L42 https://github.com/frida/frida-gum/tree/master/libs /口香糖/教授
声明:本站的技术帖子网页,遵循CC BY-SA 4.0协议,如果您需要转载,请注明本站网址或者原文地址。任何问题请咨询:yoyou2525@163.com.