... | @@ -22,7 +22,7 @@ Lazart works with several steps described in the figure below: |
... | @@ -22,7 +22,7 @@ Lazart works with several steps described in the figure below: |
|
|
|
|
|
To get started with lazart, please consider the following guides and tutorials:
|
|
To get started with lazart, please consider the following guides and tutorials:
|
|
|
|
|
|
- [Install Lazart:](Environement/Install-Lazart) how to install Lazart using docker.
|
|
- [Install Lazart:](Environment/Install-Lazart) how to install Lazart using docker.
|
|
- [Tutorial 1:](Overview/Tutorial-1:-Get-started-with-verify_pin-analysis) Get started with `verify_pin` analysis.
|
|
- [Tutorial 1:](Overview/Tutorial-1:-Get-started-with-verify_pin-analysis) Get started with `verify_pin` analysis.
|
|
- [Tutorial 2:](Overview/Tutorial-2:-Symbolic-Inputs,-Equivalence-and-Redundancy) Symbolic Inputs, equivalence and redundancy.
|
|
- [Tutorial 2:](Overview/Tutorial-2:-Symbolic-Inputs,-Equivalence-and-Redundancy) Symbolic Inputs, equivalence and redundancy.
|
|
- [Tutorial 3:](Overview/Tutorial-3:-Data-Load-and-model-combination-on-memcmps) Data Load and modelcombination on memcmps.
|
|
- [Tutorial 3:](Overview/Tutorial-3:-Data-Load-and-model-combination-on-memcmps) Data Load and modelcombination on memcmps.
|
... | @@ -34,7 +34,7 @@ To get started with lazart, please consider the following guides and tutorials: |
... | @@ -34,7 +34,7 @@ To get started with lazart, please consider the following guides and tutorials: |
|
**Lazart** is separated into several modules:
|
|
**Lazart** is separated into several modules:
|
|
|
|
|
|
- [**Python API**](Analysis): the _Python API_ corresponds to the core of **Lazart**. It includes the user interface to define and run analysis, algorithms and results manipulation features. [technical documentation](https://securitytools.gricad-pages.univ-grenoble-alpes.fr/lazart/python-api/index.html)
|
|
- [**Python API**](Analysis): the _Python API_ corresponds to the core of **Lazart**. It includes the user interface to define and run analysis, algorithms and results manipulation features. [technical documentation](https://securitytools.gricad-pages.univ-grenoble-alpes.fr/lazart/python-api/index.html)
|
|
- [**Lazart CLI**](Environement): the command line interface is constituted of several utility commands for working with **Lazart** and _Lazart's docker_.
|
|
- [**Lazart CLI**](Environment): the command line interface is constituted of several utility commands for working with **Lazart** and _Lazart's docker_.
|
|
- [**Mutation Module**](Mutation/Wolverine): the mutation module, mainly compound of the tool **Wolverine**, works on _LLVM bytecode_ to generate mutated bytecodes embedding symbolic faults injection mechanism to be analyzed by a _concolic engine_ (_KLEE_). [technical documentation](https://securitytools.gricad-pages.univ-grenoble-alpes.fr/lazart/wolverine/index.html)
|
|
- [**Mutation Module**](Mutation/Wolverine): the mutation module, mainly compound of the tool **Wolverine**, works on _LLVM bytecode_ to generate mutated bytecodes embedding symbolic faults injection mechanism to be analyzed by a _concolic engine_ (_KLEE_). [technical documentation](https://securitytools.gricad-pages.univ-grenoble-alpes.fr/lazart/wolverine/index.html)
|
|
- [**Instrumentation API**](Instrumentation/Instrumentation-API): the Instrumentation API is a small module of **Lazart** providing utility headers for instrumenting analyzed programs. [technical documentation](https://securitytools.gricad-pages.univ-grenoble-alpes.fr/lazart/cpp-api/index.html)
|
|
- [**Instrumentation API**](Instrumentation/Instrumentation-API): the Instrumentation API is a small module of **Lazart** providing utility headers for instrumenting analyzed programs. [technical documentation](https://securitytools.gricad-pages.univ-grenoble-alpes.fr/lazart/cpp-api/index.html)
|
|
- [**FISSC**](https://lazart.gricad-pages.univ-grenoble-alpes.fr/fissc/): the _Fault Injection and Simulation Secure Collection_ is not directly part of **Lazart**. However, this collection is also developped at **Verimag** and is heavily used as use case for fault injection and countermeasure analysis. For more information, please consult the FISSC's [home page](https://lazart.gricad-pages.univ-grenoble-alpes.fr/fissc/).
|
|
- [**FISSC**](https://lazart.gricad-pages.univ-grenoble-alpes.fr/fissc/): the _Fault Injection and Simulation Secure Collection_ is not directly part of **Lazart**. However, this collection is also developped at **Verimag** and is heavily used as use case for fault injection and countermeasure analysis. For more information, please consult the FISSC's [home page](https://lazart.gricad-pages.univ-grenoble-alpes.fr/fissc/).
|
... | | ... | |