head     1.1;
branch   1.1.1;
access   ;
symbols  start:1.1.1.1 project:1.1.1;
locks    ; strict;
comment  @# @;


1.1
date     2009.07.09.02.51.48;  author yo2dh;  state Exp;
branches 1.1.1.1;
next     ;

1.1.1.1
date     2009.07.09.02.51.48;  author yo2dh;  state Exp;
branches ;
next     ;


desc
@@



1.1
log
@Initial revision
@
text
@This is a source release of BOON 1.0, a tool that can help security
experts to audit security-critical C source code for buffer overrun
vulnerabilities.

This tool is not for the faint of heart.  The current release is only
a research prototype.  It has many known limitations, and it may have
many bugs.  No promises!  If it breaks, you get to keep both pieces; you
get what you paid for; and so on.  Most likely you will encounter bugs
and idiosyncracies in the behavior of this software, and unfortunately,
I do not have time at present to provide any support whatsoever.  As a
result, using this tool may require expertise and patience.  Please make
sure your expectations are set accordingly.

See the file INSTALL for installation instructions, EXAMPLES for a
mini-tutorial on how to use the tool by way of some worked-out examples,
and TIPS for some more advanced usage tips, limitations, and workarounds.

This source code is provided for research purposes.  See the file LICENSE
for information on usage and redistribution of these files, and for a
*DISCLAIMER OF ALL WARRANTIES*.

This software was built as part of David Wagner's Ph.D. dissertation, in
collaboration with Jeff Foster, Eric Brewer, and Alex Aiken.  This tool
is built on top of the BANE toolkit.  Many thanks to the BANE research
group for making this software possible!

If you have patches, bugfixes, or urgent correspondence about the tool,
you can send email to <boon@@mozart.cs.berkeley.edu>.  However, if you
find any bugs, I probably won't be available to help fix them.
@


1.1.1.1
log
@CVS TEST
@
text
@@
