MAMBO: A Low-Overhead Dynamic Binary Modification Tool for ARM
- Cosmin Gorgovan, Amanieu d’Antras, and Mikel Luján. 2016. MAMBO: A low-overhead dynamic binary modification tool for ARM. ACM Trans. Archit. Code Optim. 13, 1, Article 14 (April 2016)
Note that the version of MAMBO published in this repository is newer and has significantly lower overhead than the one used in the paper. If you want to reproduce the results in the paper, please get in touch.
MAMBO’s compatibility with applications is continuously being improved as needed. We are using it on ARMv7 and ARMv8 systems running 32-bit (AAarch32) userlands. Our systems run the armhf build of Debian and Ubuntu. Most simple GNU/Linux applications work correctly. The following more complex applications and benchmark suites are working correctly under MAMBO on our systems (this is not an exhaustive list):
- SPEC CPU2006
- PARSEC 3.0
- GCC (GCC running under MAMBO can build MAMBO)
Also read the Known issues section below.
Prerequisites: an ARM system (physical or virtual) to build and run MAMBO on; dependencies: gcc toolchain, libelf(-dev), ruby (>=1.9.1).
git clone email@example.com:beehive-lab/mambo.git cd mambo git submodule init git submodule update make
To launch an application under MAMBO, run:
./dbm <path_to_executable> [application's command line arguments]
For example to run
ls -a under MAMBO, execute:
./dbm /bin/ls -a
Tip: When an application running under MAMBO exits, the string
We're done; exiting with status: <APPLICATION'S EXIT CODE> will be printed to stderr.
The plugin API is event-driven. Plugins should use a init function with
__attribute__((constructor)) to register themselves using
mambo_register_plugin() . Once a plugin is registered, it can install callbacks for various events using the
mambo_register_*_cb() functions. Callback-related functions are listed in
api/plugin_support.h . Code generation functions are listed in
api/emit_<INST SET>.h and code generation helpers are listed in
api/helpers.h . You can also inspect the sample plugin in the
To build MAMBO with plugin support, uncomment the
-DPLUGINS_NEW CFLAG in the
makefile . Then, the source code or object file(s) of the plugin you’re trying to build must be added to the
PLUGINS= line in the
makefile . Note that multiple plugins can be enabled at the same time (and will work correctly if properly designed). For performance reasons, it is recommended to remove unused plugins from the
- There are several issues around signal handling. Large applications which use signals might crash when running under MAMBO. We have started redesigning signal handling (out of tree) to fix this issue.
- At the moment, code cache invalidation in response to the
__cache_flushsystem calls are only done in the thread in which the system call is executed. This can potentially lead to execution of stale cached code in other threads.
munmapsystem calls flush the code cache, instead of only those which unmap code that has been translated. This can increase the overhead for applications which call
If you think you have found a bug which is not in the list of Known issues , please report ithere, on Github. However, note that we have limited time available to investigate and fix bugs which are not affecting the workloads we are using. Therefore, if you can’t pinpoint the cause of the bug yourself, we ask that you provide as many details on how to reproduce it, and preferably provide a statically linked executable which triggers it.
We welcome contributions. Use pull requests on Github. However, note that we are doing most development in a private git tree and we are working on a number of features which are not quite ready for public release. Therefore, we would strongly encourage you to get in touch before starting to work on anything large, to avoid duplication of effort. We can probably expedite our release of any WIP features you might be interested in, if you do that.
Note that similarly to most other DBM / DBI frameworks and to optimise performance / development effort, MAMBO is not designed to secure itself against malicious activity from the application it is translating. This means that without hardening MAMBO itself, it would not be possible to use it to implement a secure sandbox.
转载本站任何文章请注明：转载至神刀安全网，谢谢神刀安全网 » MAMBO: A Low-Overhead Dynamic Binary Modification Tool for ARM