SymWalker: Symbolic Execution in Routines of Binary Code

被引:0
|
作者
Ma, Jinxin [1 ]
Dong, Guowei [1 ]
Zhang, Puhan [1 ]
Guo, Tao [1 ]
机构
[1] China Informat Technol Secur Evaluat Ctr, Beijing, Peoples R China
关键词
symbolic execution; control flow analysis; security property; vulnerabilities;
D O I
10.1109/CIS.2014.16
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Detecting vulnerabilities in binary codes is one of the most difficult problems due to the lack of type information and symbols. We propose a novel tool to perform symbolic execution inside the routines of binary codes, providing easy static analysis for vulnerability detection. Compared with existing systems, our tool has four properties: first, it could work on binary codes without source codes; second, it employs the VEX language for program analysis, thus having no side effects; third, it could deliver high coverage by statically executing on control flow graphs of disassembly codes; fourth, two security property rules are summarized to detect the corresponding vulnerabilities, based on which a convenient interface is provided for developers to detecting vulnerabilities, such as buffer overflow, improper memory access, and etc. Experimental results on real software binary files show that our tool could efficiently detect different types of vulnerabilities.
引用
收藏
页码:694 / 698
页数:5
相关论文
共 50 条
  • [41] SYMBOLIC EXECUTION AND TESTING
    COWARD, PD
    INFORMATION AND SOFTWARE TECHNOLOGY, 1991, 33 (01) : 53 - 64
  • [42] Symbolic execution with abstraction
    Anand S.
    Pǎsǎreanu C.S.
    Visser W.
    International Journal on Software Tools for Technology Transfer, 2009, 11 (01) : 53 - 67
  • [43] Advances in Symbolic Execution
    Yang, Guowei
    Filieri, Antonio
    Borges, Mateus
    Clun, Donato
    Wen, Junye
    ADVANCES IN COMPUTERS, VOL 113, 2019, 113 : 225 - 287
  • [44] Predicting the Resilience of Obfuscated Code Against Symbolic Execution Attacks via Machine Learning
    Banescu, Sebastian
    Collberg, Christian
    Pretschner, Alexander
    PROCEEDINGS OF THE 26TH USENIX SECURITY SYMPOSIUM (USENIX SECURITY '17), 2017, : 661 - 678
  • [45] SMT-Constrained Symbolic Execution Engine for Integer Overflow Detection in C Code
    Muntean, Paul
    Rahman, Mustafizur
    Ibing, Andreas
    Eckert, Claudia
    2015 INFORMATION SECURITY FOR SOUTH AFRICA - PROCEEDINGS OF THE ISSA 2015 CONFERENCE, 2015,
  • [46] Advancing scientific computation by improving scientific code development: Symbolic execution and semantic analysis
    Stewart, M
    COMPUTATIONAL SCIENCE - ICCS 2005, PT 1, PROCEEDINGS, 2005, 3514 : 1043 - 1050
  • [47] Towards a tool for rigorous, automated code comprehension using symbolic execution and semantic analysis
    Stewart, MEM
    29th Annual IEEE/NASA Software Engineering Workshop, Proceedings, 2005, : 89 - 96
  • [48] Symbolic PathFinder: Symbolic execution of Java bytecode
    NASA Ames Research Center, Moffett Field, CA 94035, United States
    ASE - Proc. IEEE/ACM Int. Conf. Autom. Softw. Eng., (179-180):
  • [49] A Branch History Directed Heuristic Search for Effective Binary Level Dynamic Symbolic Execution
    Hu, Yan
    Kong, Weiqiang
    Ren, Yizhi
    Choo, Kim-Kwang Raymond
    IEEE ACCESS, 2017, 5 : 8752 - 8762
  • [50] Supporting routines for the SRIM code
    Pavlovic, Marius
    Strasik, Ivan
    NUCLEAR INSTRUMENTS & METHODS IN PHYSICS RESEARCH SECTION B-BEAM INTERACTIONS WITH MATERIALS AND ATOMS, 2007, 257 (1-2 SPEC. ISS.): : 601 - 604