1. Computers
  2. Display Drivers
  3. Graphics Cards
  4. Memory
  5. Motherboards
  6. Processors
  7. Software
  8. Storage
  9. Operating Systems


Facebook RSS Twitter Twitter Google Plus


Phoronix Test Suite

OpenBenchmarking.org

DARPA Project Using LLVM For Better Code Security

Compiler

Published on 02 December 2012 03:37 PM EST
Written by Michael Larabel in Compiler
3 Comments

A software research project being funded by the United States' Defense Advanced Research Projects Agency (DARPA) with its Cyber Fast Track program is looking at ways for providing a flexible and integrated security infrastructure by using LLVM for dynamic and static security tasks.

For the past few weeks I have been sharing some of the interesting slides from last month's LLVM Developers' Meeting in San Jose, California. Among the interesting technical sessions covered so far were on ThreadSanitizer and MemorySanitizer, how Google treats Clang compiler errors, the state of 64-bit ARM, Clang analyzing code comments to auto-generate documentation, LLVM/Clang being ported to a super computer, and Intel's Shevlin Park project that uses LLVM/Clang to make Microsoft's C++ AMP framework cross-platform. There's one more interesting presentation that may interest many Phoronix readers and the slides for that session were recently uploaded.

Jared Carlson of GoToTheBoard has been involved with a research project being financed by DARPA, a division of the US Department of Defense. The talk comes down to leveraging LLVM and LLDB (the LLVM debugger) for dynamic and static security tasks. "The talk discusses incorporating both static and dynamic analysis techniques by using LLVM and LLDB components and that these can easily be integrated back into LLVM development workflow. These tools will help find exploitable bugs within the llvm development environment, illustrate their consequences and are customizable and easily shared within the community. Funded by DARPA as a Cyber Fast Track effort, we are currently incorporating LLDB and other open source python libraries along with re-written static analysis scripts so that the tools can be easily integrated and altered into a workflow...The talk will discuss how we use the tools to investigate bug severity, utilize artificial intelligence techniques to predispose fuzzing, draw conclusions, and utilize the LLVM technology quite to target various architectures if desired."

Project goals for the US government were to create a tool to find exploitable bugs within a "normal" environment, illustrate consequences of these bugs, educate and interact wit hthe developer, and allow for community improvement and sharing. The areas then covered in the presentation were on static analysis, function graph, data dependency, hypothesis engine, and the fuzzer.

An alpha version of this project was delivered to DARPA in September. A beta version was to be delivered around the end of November. After the project has finished, the plan is to release the code to the open-source community which should happen any day now -- the presentation states the release aim as "early December or thereabouts."

For those wanting to learn more about this LLVM research project, see the 41 PDF slides.

About The Author
Michael Larabel is the principal author of Phoronix.com and founded the web-site in 2004 with a focus on enriching the Linux hardware experience and being the largest web-site devoted to Linux hardware reviews, particularly for products relevant to Linux gamers and enthusiasts but also commonly reviewing servers/workstations and embedded Linux devices. Michael has written more than 10,000 articles covering the state of Linux hardware support, Linux performance, graphics hardware drivers, and other topics. Michael is also the lead developer of the Phoronix Test Suite, Phoromatic, and OpenBenchmarking.org automated testing software. He can be followed via and or contacted via .
Latest Articles & Reviews
  1. NVIDIA's Latest Maxwell Line-Up Against AMD With Catalyst On Linux
  2. Preliminary Tests Of Intel Sandy Bridge & Ivy Bridge vs. Broadwell
  3. AMD FX-8320E Performance On Linux
  4. Linux Compiler Benchmarks Of LLVM Clang 3.5 vs. LLVM Clang 3.6-rc1
  5. Intel Broadwell HD Graphics 5500: Windows 8.1 vs. Linux
  6. Linux Benchmarks Of NVIDIA's Early 2015 GeForce Line-Up
Latest Linux News
  1. NVIDIA Tegra DRM Driver Supports Atomic Mode-Setting In Linux 3.20
  2. Linux "GHOST" Vulnerability Hits Glibc Systems
  3. Linux Game Publishing Remains Offline, Three Years After The CEO Shakeup
  4. PlayStation 4 System Compiler Support Landing In LLVM
  5. Now-Closed KDE Vulnerabilities Remind Us X11 Screen Locks / Screensavers Are Insecure
  6. Vivaldi: A New Chromium-Powered, Multi-Platform Browser
  7. KDE Plasma 5.2 Officially Released
  8. Intel Broadwell On Linux Has Working OpenCL 1.2, VP8 Video Acceleration
  9. GParted 0.21 Brings ReFS Detection, EXT4 For RHEL5, Reiser4 For Linux 3.x
  10. Wine Staging Update Has Better CUDA Support, Driver Testing Framework
Most Viewed News This Week
  1. Windows 10 To Be A Free Upgrade: What Linux Users Need To Know
  2. LibreOffice 4.4 Is Coming Soon With New Features
  3. TraceFS: The Newest Linux File-System
  4. My Initial Intel Broadwell Linux Experience With The ThinkPad X1 Carbon
  5. Interstellar Marines On Linux With Catalyst: Bull S*#@
  6. Broadwell Linux Ultrabook Running MUCH Cooler Than Haswell
  7. Faster VP9 Decoding Is On The Horizon
  8. Linux Users Upset By Chromium's Busted HiDPI Support