cwe_checker (@cwe_checker) 's Twitter Profile
cwe_checker

@cwe_checker

The cwe_checker is a tool to find vulnerable patterns (CWEs) in binary executables

ID: 1349265635084283905

linkhttps://github.com/fkie-cad/cwe_checker calendar_today13-01-2021 08:03:17

6 Tweet

54 Followers

4 Following

cwe_checker (@cwe_checker) 's Twitter Profile Photo

Version 0.4 of the cwe_checker was released just a few days ago. Highlight of the release is the new Ghidra backend, which can be used as an alternative to the old BAP backend. Check it out on github.com/fkie-cad/cwe_c…

cwe_checker (@cwe_checker) 's Twitter Profile Photo

We implemented a brand new buffer overflow check for the cwe_checker. Buffer overflows are so notoriously dangerous that they currently occupy the 2nd, 4th and 5th place in the Mitre top 25 most dangerous software weaknesses list. Go check it out!

cwe_checker (@cwe_checker) 's Twitter Profile Photo

We released version 0.5 of the cwe_checker today! Highlights: The switch from BAP to Ghidra as our backend and three new CWE checks, including one for Buffer Overflows. Go check it out! github.com/fkie-cad/cwe_c…

cwe_checker (@cwe_checker) 's Twitter Profile Photo

We released version 0.6 of the cwe_checker today! Highlights: Bare-metal analysis mode and improved checks for buffer overflows and use-after-free CWEs. Go check it out! github.com/fkie-cad/cwe_c…

cwe_checker (@cwe_checker) 's Twitter Profile Photo

We released version 0.7 of the cwe_checker today! Highlights: A new check for CWE-789 and many improvements under the hood. Go check it out now! github.com/fkie-cad/cwe_c…

cwe_checker (@cwe_checker) 's Twitter Profile Photo

v0.9 is out today! Users get experimental support for the analysis of LKMs and a new check for CWE252. Devs can use the new taint analysis abstractions to write powerful analyses in even less LOC, and benchmark them with our new microbenchmarking support.