File: control

package info (click to toggle)
sandsifter 1.03-2
  • links: PTS, VCS
  • area: main
  • in suites: buster
  • size: 10,912 kB
  • sloc: python: 1,726; ansic: 1,256; sh: 28; makefile: 20
file content (33 lines) | stat: -rw-r--r-- 1,343 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
Source: sandsifter
Section: utils
Priority: optional
Maintainer: Debian Security Tools <team+pkg-security@tracker.debian.org>
Uploaders: SZ Lin (林上智) <szlin@debian.org>
Build-Depends: debhelper (>= 12),
               libcapstone-dev,
               python (>= 2.7)
X-Python-Version: >= 2.7
Standards-Version: 4.3.0
Homepage: https://github.com/rigred/sandsifter
Vcs-Browser: https://salsa.debian.org/pkg-security-team/sandsifter
Vcs-Git: https://salsa.debian.org/pkg-security-team/sandsifter.git

Package: sandsifter
Architecture: amd64 i386
Depends: ${misc:Depends}, ${shlibs:Depends},
         python (>= 2.7),
         python-capstone
Recommends: binutils,
            nasm
Description: x86 processor fuzzer
 The sandsifter audits x86 processors for hidden instructions and
 hardware bugs, by systematically generating machine code to search
 through a processor's instruction set, and monitoring execution for
 anomalies. Sandsifter has uncovered secret processor instructions from
 every major vendor; ubiquitous software bugs in disassemblers,
 assemblers, and emulators; flaws in enterprise hypervisors; and both
 benign and security-critical hardware bugs in x86 chips.
 .
 With the multitude of x86 processors in existence, the goal of the
 tool is to enable users to check their own systems for hidden
 instructions and bugs.