Javier Cabrera

Results 14 issues of Javier Cabrera

Hi @geky In my use of case the data-layout metadata is needed. Taking a look at the llvm-alt crate, it seems that there is no way using the wrapper. However,...

RFP Proposal: FVM - Automated Testing, Fuzzing and Optimisation == **Name of Project:** FVM - Automated Testing (Fuzzing for FVM) **Link to RFP:** Please link to the RFP that you...

Open Grant

In `wasm-mutate`, what about adding the mutation history in a custom section ? Each mutation (optionally) can be recorded as a new entry in the `wasm-mutate` custom section. The entry...

Use [SWAM](https://github.com/satabin/swam) as the core to create a full-fledge fuzzer for WASM. As a big picture here are the milestone to achieve it: Depends on the WASM coverage tool, see...

Hi @olapiv Could you take a look? https://github.com/KTH/slumps/runs/1485427473 It seems that something is broken with the CI :(

bug

The communication between Souper and CROW can be improved. DONE in #67: - Souper - [x] Parallel processing of code blocks - [x] Peer2Peer socket communication with CROW if a...

Create a "middle" ground documentation between the [packages specification](https://swam.gnieh.org/) and the source code documentation. Create a document with the architecture of SWAM.

We have three sources for vulnerabilities experimentation with SLUMPs: - Memory disclosures from #7 (C code [here](https://github.com/KTH/slumps/tree/master/vulnerable_programs/report-web-assembly-memory-safety/c)) - Whitebox cryptographic programs mentioned in #27 - CVEs report for webassembly mentioned...

enhancement

The header "wasm-interpreter.h" has a definition to use a "standard" trace functionality (see the "NOTE_ENTER" templates). It would be good to execute wasm binaries with such capability (see ```WASM_INTERPRETER_DEBUG``` flag)....