in reply to Greetings and salutations | sudo
If I understand your post right, you want to use Perl to stop buffer overflow or other vulnerabilities in unrelated binaries.
If that's right, then as I see it, you either run said binaries and Perl pipes input to them, as you demonstrate.
Or have Perl spawn them (e.g. via a system) but within a special sandbox (this is very abstract, I am not sure how to do that).
The latter case is interesting because it can check the binary for vulnerabilities before spawning it. Like here: https://stackoverflow.com/a/8783198 . In fact, there must be a tool already for scanning executables or source code for such vulnerabilities, given all this "AI" hype, even if very mechanistic and limited. For one, gcc warns me about copying larger data onto fixed-size arrays.
bw, bliako
|
---|
Replies are listed 'Best First'. | |
---|---|
Re^2: Greetings and salutations | sudo
by zentara (Cardinal) on Feb 07, 2020 at 19:20 UTC | |
by bliako (Abbot) on Feb 08, 2020 at 12:42 UTC | |
by zentara (Cardinal) on Mar 02, 2020 at 22:02 UTC | |
by Anonymous Monk on Mar 03, 2020 at 13:59 UTC |