SymWalker: Symbolic Execution in Routines of Binary Code

被引:0
|
作者
Ma, Jinxin [1 ]
Dong, Guowei [1 ]
Zhang, Puhan [1 ]
Guo, Tao [1 ]
机构
[1] China Informat Technol Secur Evaluat Ctr, Beijing, Peoples R China
关键词
symbolic execution; control flow analysis; security property; vulnerabilities;
D O I
10.1109/CIS.2014.16
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Detecting vulnerabilities in binary codes is one of the most difficult problems due to the lack of type information and symbols. We propose a novel tool to perform symbolic execution inside the routines of binary codes, providing easy static analysis for vulnerability detection. Compared with existing systems, our tool has four properties: first, it could work on binary codes without source codes; second, it employs the VEX language for program analysis, thus having no side effects; third, it could deliver high coverage by statically executing on control flow graphs of disassembly codes; fourth, two security property rules are summarized to detect the corresponding vulnerabilities, based on which a convenient interface is provided for developers to detecting vulnerabilities, such as buffer overflow, improper memory access, and etc. Experimental results on real software binary files show that our tool could efficiently detect different types of vulnerabilities.
引用
收藏
页码:694 / 698
页数:5
相关论文
共 50 条
  • [1] Binary code execution path based on symbolic and actual program execution
    Cui, Baojiang
    Guo, Pengfei
    Wang, Jianxin
    Qinghua Daxue Xuebao/Journal of Tsinghua University, 2009, 49 (SUPPL. 2): : 2186 - 2192
  • [2] Symbolic Execution of Obfuscated Code
    Yadegari, Babak
    Debray, Saumya
    CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 732 - 744
  • [3] Symbolic Execution of Programmable Logic Controller Code
    Guo, Shengjian
    Wu, Meng
    Wang, Chao
    ESEC/FSE 2017: PROCEEDINGS OF THE 2017 11TH JOINT MEETING ON FOUNDATIONS OF SOFTWARE ENGINEERING, 2017, : 326 - 336
  • [4] Code Obfuscation Against Symbolic Execution Attacks
    Banescu, Sebastian
    Collberg, Christian
    Ganesh, Vijay
    Newsham, Zack
    Pretschner, Alexander
    32ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2016), 2016, : 189 - 200
  • [5] Directed Symbolic Execution for Binary Vulnerability Mining
    Wu, Bo
    Li, Mengjun
    Zhang, Bin
    Zhang, Quan
    Tang, Chaojing
    2014 IEEE WORKSHOP ON ELECTRONICS, COMPUTER AND APPLICATIONS, 2014, : 614 - 617
  • [6] SENinja: A symbolic execution plugin for Binary Ninja
    Borzacchiello, Luca
    Coppa, Emilio
    Demetrescu, Camil
    SOFTWAREX, 2022, 20
  • [7] Distributed Symbolic Execution for Binary Software Testing
    Wu, Bo
    Li, Mengjun
    Zhang, Bin
    Zhang, Quan
    Tang, Chaojing
    2014 IEEE WORKSHOP ON ELECTRONICS, COMPUTER AND APPLICATIONS, 2014, : 618 - 621
  • [8] Validating converted java code via symbolic execution
    Sneed, Harry M.
    Verhoef, Chris
    Lecture Notes in Business Information Processing, 2017, 269 : 70 - 83
  • [9] SECloud: Binary Analyzing Using Symbolic Execution in the Cloud
    Zhou, Lin
    Gan, ShuiTao
    Qin, XiaoJun
    Han, WenBao
    2013 INTERNATIONAL CONFERENCE ON ADVANCED CLOUD AND BIG DATA (CBD), 2013, : 58 - 63
  • [10] Loop-Extended Symbolic Execution on Binary Programs
    Saxena, Prateek
    Poosankam, Pongsin
    McCamant, Stephen
    Song, Dawn
    ISSTA 2009: INTERNATIONAL SYMPOSIUM ON SOFTWARE TESTING AND ANALYSIS, 2009, : 225 - 235