Hi,
I am trying to run the leakage analysis to make sure the hardened binary instrumentation is secure but I don't quite clearly understand how I should determine the list of interesting-offset-ranges to be traced. Is there a suggested way to do this?
Thanks
Hi,
I am trying to run the leakage analysis to make sure the hardened binary instrumentation is secure but I don't quite clearly understand how I should determine the list of interesting-offset-ranges to be traced. Is there a suggested way to do this?
Thanks