To get taint analysis working, it is essential to define the taint sources clearly. All the analysis in this article is based on MySQL Cluster 8.0.25 and Binary Ninja. I approached this as a graph reachability problem, for which Tainted Flow Analysis on e-SSA-form Programs served as an excellent reference.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |