Guided Symbolic Execution in Real-World Binary Program

被引:0
作者
Park, Sung Hyun [1 ]
Noh, Bong Nam [1 ]
机构
[1] Chonnam Natl Univ, Interdisciplinary Program Informat Secur, Gwangju, South Korea
来源
INFORMATION SCIENCE AND APPLICATIONS | 2020年 / 621卷
关键词
Symbolic execution; Program analysis; Binary analysis; Backward analysis;
D O I
10.1007/978-981-15-1465-4_39
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Symbolic execution, one of the methods of program automatic analysis, has significantly improved technically over the past few years. However, it is still not practical to analyze the program using only the symbolic execution itself. The main reason is the lack of memory due to the path explosion problem which occurs during the Real-world Program analysis, for which we cannot get all solutions on all the paths of the program. Therefore, it is practical for the analyst to organize the symbolic execution search path with points having vulnerability rather than getting solutions on all the paths and then to carry out the analysis. In this paper, we propose static analysis method and dynamic analysis method based on Real-World Binary analysis. First, Static Backward Analysis enables the analyst to select potential vulnerable points within the binary and generate a backward Control Flow Graph (CFG) generated from the corresponding point to the user input (I/O) point. At the dynamic analysis stage, we propose Taint Analysis for generating Symbolic File and in Guided Symbolic Execution based on the selected priority path we propose, and Bug Check Model. In order to prove the efficiency of our research, we conducted a study of identifying vulnerable point in severalWindows and Linux Real-world binaries, and the experiment results showed that it was possible to identify vulnerability in various situations of binaries.
引用
收藏
页码:387 / 396
页数:10
相关论文
共 7 条
[1]   A Survey of Symbolic Execution Techniques [J].
Baldoni, Roberto ;
Coppa, Emilio ;
D'Elia, Daniele Cono ;
Demetrescu, Camil ;
Finocchi, Irene .
ACM COMPUTING SURVEYS, 2018, 51 (03) :1-39
[2]  
Chipounov V, 2011, N ACM SIGARCH COMPUT, V39
[3]  
Haller I, 2013, 22 USENIX SEC S
[4]  
Neugschwandtner Matthias, 2015, P 5 ACM C DAT APPL S
[5]  
Serebryany Konstantin, 2012, USENIX ANN TECHN C
[6]   TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection [J].
Wang, Tielei ;
Wei, Tao ;
Gu, Guofei ;
Zou, Wei .
2010 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2010, :495-+
[7]  
Yao F, 2017, 47 ANN IEEE IFIP INT