You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Racing was evaluated on an x86 Ubuntu 20.04 machine. Before you start everything, make sure to set the following configurations on your host machine (as required by AFL fuzzing).
23
12
24
-
Before you start everything, make sure to set the following configurations on your host machine (as required by AFL fuzzing).
25
13
```
26
14
### use root permission if necessary
27
15
@@ -33,7 +21,22 @@ echo performance | tee cpu*/cpufreq/scaling_governor
33
21
echo 0 | tee /proc/sys/kernel/randomize_va_space
34
22
```
35
23
36
-
Racing was evaluated on Ubuntu 20.04. To obtain a clean environment for testing, one can pull the `ubuntu:20.04` image and launch the following container.
24
+
## TL;DR
25
+
26
+
You may use our [Dockerfile](Dockerfile) to setup a testing environment. It automatically performs steps `S1 & S2` below. After the image has been built, please jump to step `S3` to run the commands inside the `racing-eval` container.
-`InstTracer`: A simple tracer to extract instructions that are covered by a vulnerability PoC.
@@ -77,7 +80,7 @@ cd ${RACING_DIR}/Racing-final/llvm_mode
77
80
make
78
81
```
79
82
80
-
## Testing Steps
83
+
## S3. Testing Steps
81
84
82
85
The `examples` folder contains the scripts for analyzing the 30 vulnerabilities used in our paper. To reproduce it, please refer to the following example:
0 commit comments