Karonte is a static analysis tool to detect multi-binary vulnerabilities in embedded firmware.
Research Paper
We present our approach and the findings of this work in the following research paper:
Detecting Insecure Multi-binary Interactions in Embedded Firmware [PDF]
Nilo Redini, Aravind Machiry, Ruoyu Wang, Chad Spensky, Andrea Continella, Yan Shoshitaishvili, Christopher Kruegel, Giovanni Vigna. To appear in Proceedings of the IEEE Symposium on Security & Privacy (S&P), May 2020
If you use it in a scientific publication, we would appreciate citations using this Bibtex entry:
@inproceedings{redini_karonte_20,
author = {Nilo Redini and Aravind Machiry and Ruoyu Wang and Chad Spensky and Andrea Continella and Yan Shoshitaishvili and Christopher Kruegel and Giovanni Vigna},
booktitle = {To appear in Proceedings of the IEEE Symposium on Security & Privacy (S&P)},
month = {May},
title = {KARONTE: Detecting Insecure Multi-binary Interactions in Embedded Firmware},
year = {2020}
} Also Read – Stowaway : Multi-hop Proxy Tool For Pentesters
Repository Structure
There are four main directories:
Run
To run it, from the root directory, just run
By default, results are saved in /tmp/ with the suffix Karonte.txt.
To inspect the generated alerts, just run:
python tool/pretty_print.py LOG_NAME
Docker
A dockerized version of it is ready to use can be found here
Dataset
You can obtain it dataset at this link
Java remains one of the most widely used programming platforms for servers, enterprise applications, Android…
Ubuntu users often download software directly from developer websites instead of using the default app…
Installing Ubuntu 26.04 LTS is only the first step toward building a smooth, secure, and…
What is a Software Supply Chain Attack? A software supply chain attack occurs when a…
When people ask how UDP works, the simplest answer is this: UDP sends data quickly…
Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…