-
Notifications
You must be signed in to change notification settings - Fork 0
/
dune-project
72 lines (66 loc) · 1.73 KB
/
dune-project
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
(lang dune 2.0)
(using menhir 2.0)
(generate_opam_files true)
(name binsec)
(version "0.4")
(maintainers "BINSEC <binsec@saxifrage.saclay.cea.fr>")
(authors
"Adel Djoudi"
"Benjamin Farinier"
"Ducousso Soline"
"Frédéric Recoules"
"Josselin Feist"
"Lesly-Ann Daniel"
"Manh-Dung Nguyen"
"Mathilde Ollivier"
"Matthieu Lemerre"
"Olivier Nicole"
"Richard Bonichon"
"Robin David"
"Ta Thanh Dinh"
"Yaëlle Vinçont"
"Guillaume Girol"
)
(license LGPL-2.1-or-later)
(homepage "https://binsec.github.io")
(source (github binsec/binsec))
(bug_reports "mailto:binsec@saxifrage.saclay.cea.fr")
(package
(name binsec)
(synopsis "Semantic analysis of binary executables")
(description "
BINSEC aims at developing an open-source platform filling the gap between formal
methods over executable code and binary-level security analyses currently used
in the security industry.
The project targets the following applicative domains:
vulnerability analyses
malware comprehension
code protection
binary-level verification
BINSEC is developed at CEA List in scientfic collaboration with Verimag and LORIA.
An overview of some BINSEC features can be found in our SSPREW'17 tutorial.")
(depends
(ocaml (and :build (>= 4.08) (< 4.13)))
(ocamlfind :build)
(menhir :build)
(ocamlgraph (>= 1.8.5))
(zarith (>= 1.4))
(seq (>= 0.1))
(mmap (>= 1))
(bitwuzla (>= 1))
(ounit2 (and :with-test (>= 2)))
(qcheck (and :with-test (>= 0.7))))
(depopts
(llvm (>= 6.0.0)))
(tags
("binary code analysis"
"symbolic execution"
"deductive"
"program verification"
"formal specification"
"automated theorem prover"
"plugins"
"abstract interpretation"
"dataflow analysis"
"linking"
"disassembly")))