SymWalker: Symbolic Execution in Routines of Binary Code

被引:0
|
作者
Ma, Jinxin [1 ]
Dong, Guowei [1 ]
Zhang, Puhan [1 ]
Guo, Tao [1 ]
机构
[1] China Informat Technol Secur Evaluat Ctr, Beijing, Peoples R China
关键词
symbolic execution; control flow analysis; security property; vulnerabilities;
D O I
10.1109/CIS.2014.16
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Detecting vulnerabilities in binary codes is one of the most difficult problems due to the lack of type information and symbols. We propose a novel tool to perform symbolic execution inside the routines of binary codes, providing easy static analysis for vulnerability detection. Compared with existing systems, our tool has four properties: first, it could work on binary codes without source codes; second, it employs the VEX language for program analysis, thus having no side effects; third, it could deliver high coverage by statically executing on control flow graphs of disassembly codes; fourth, two security property rules are summarized to detect the corresponding vulnerabilities, based on which a convenient interface is provided for developers to detecting vulnerabilities, such as buffer overflow, improper memory access, and etc. Experimental results on real software binary files show that our tool could efficiently detect different types of vulnerabilities.
引用
收藏
页码:694 / 698
页数:5
相关论文
共 50 条
  • [31] Binary Analysis based on Symbolic Execution and Reversible x86 Instructions
    Stoenescu, Teodor
    Stefanescu, Alin
    Predut, Sorina
    Ipate, Florentin
    FUNDAMENTA INFORMATICAE, 2017, 153 (1-2) : 105 - 124
  • [32] Quantum symbolic execution
    Nan, Jiang
    Zichen, Wang
    Jian, Wang
    QUANTUM INFORMATION PROCESSING, 2023, 22 (10)
  • [33] Relational Symbolic Execution
    Farina, Gian Pietro
    Chong, Stephen
    Gaboardi, Marco
    PROCEEDINGS OF THE 21ST INTERNATIONAL SYMPOSIUM ON PRINCIPLES AND PRACTICE OF DECLARATIVE PROGRAMMING (PPDP 2019), 2019,
  • [34] Symbolic Execution with CEGAR
    Beyer, Dirk
    Lemberger, Thomas
    LEVERAGING APPLICATIONS OF FORMAL METHODS, VERIFICATION AND VALIDATION: FOUNDATIONAL TECHNIQUES, PT I, 2016, 9952 : 195 - 211
  • [35] Certified Symbolic Execution
    Qiu, Rui
    Pasareanu, Corina S.
    Khurshid, Sarfraz
    AUTOMATED TECHNOLOGY FOR VERIFICATION AND ANALYSIS, ATVA 2016, 2016, 9938 : 495 - 511
  • [36] Chopped Symbolic Execution
    Trabish, David
    Mattavelli, Andrea
    Rinetzky, Noam
    Cadar, Cristian
    PROCEEDINGS 2018 IEEE/ACM 40TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), 2018, : 350 - 360
  • [37] Quantum symbolic execution
    Jiang Nan
    Wang Zichen
    Wang Jian
    Quantum Information Processing, 22
  • [38] Directed Symbolic Execution
    Kin-Keung Ma
    Khoo Yit Phang
    Foster, Jeffrey S.
    Hicks, Michael
    STATIC ANALYSIS, 2011, 6887 : 95 - 111
  • [39] Symbolic Router Execution
    Zhang, Peng
    Wang, Dan
    Gember-Jacobson, Aaron
    SIGCOMM '22: PROCEEDINGS OF THE 2022 ACM SIGCOMM 2022 CONFERENCE, 2022, : 336 - 349
  • [40] Postconditioned Symbolic Execution
    Yi, Qiuping
    Yang, Zijiang
    Guo, Shengjian
    Wang, Chao
    Liu, Jian
    Zhao, Chen
    2015 IEEE 8TH INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION (ICST), 2015,