- blog post here: Finding vulnerabilities on *Unix kernel with Coccinelle and hacker1
- coccinelle notes and exercises
-
[advanced_queries](.(advanced_queries)
-
tips 1: start simple, with a semantic patch that matches the common case
-
tips 2: incremental development, restrict semantic patch to reduce results, fp
-
tips 3: use multiple rules to have better results and scripts
- e.g. we have @badr@ positon p; @@ @@ position p != badr.p @@
-
software lifecycle in a nutshell (ref: https://www.youtube.com/watch?v=LOsluYTzdMg)
- (great) idea
- quick and dirty implementation
- people like the idea and start to use the code
- feature requests
- bug reported
- attackers start to develop exploit
-
Julia Lawall: An Introduction to Coccinelle Bug Finding - video
-
SAN19-500K1 Keynote: Coccinelle: 10 Years of Automated Evolution in the Linux Kernel - video
-
Mentorship Session: Coccinelle: Automating Large-scale Evolution and Bug Finding in C Code - video
-
Case study: Searching for a vulnerability pattern in the Linux kernel - blog