Guided Symbolic Execution in Real-World Binary Program

被引:0
|
作者
Park, Sung Hyun [1 ]
Noh, Bong Nam [1 ]
机构
[1] Chonnam Natl Univ, Interdisciplinary Program Informat Secur, Gwangju, South Korea
来源
关键词
Symbolic execution; Program analysis; Binary analysis; Backward analysis;
D O I
10.1007/978-981-15-1465-4_39
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Symbolic execution, one of the methods of program automatic analysis, has significantly improved technically over the past few years. However, it is still not practical to analyze the program using only the symbolic execution itself. The main reason is the lack of memory due to the path explosion problem which occurs during the Real-world Program analysis, for which we cannot get all solutions on all the paths of the program. Therefore, it is practical for the analyst to organize the symbolic execution search path with points having vulnerability rather than getting solutions on all the paths and then to carry out the analysis. In this paper, we propose static analysis method and dynamic analysis method based on Real-World Binary analysis. First, Static Backward Analysis enables the analyst to select potential vulnerable points within the binary and generate a backward Control Flow Graph (CFG) generated from the corresponding point to the user input (I/O) point. At the dynamic analysis stage, we propose Taint Analysis for generating Symbolic File and in Guided Symbolic Execution based on the selected priority path we propose, and Bug Check Model. In order to prove the efficiency of our research, we conducted a study of identifying vulnerable point in severalWindows and Linux Real-world binaries, and the experiment results showed that it was possible to identify vulnerability in various situations of binaries.
引用
收藏
页码:387 / 396
页数:10
相关论文
共 50 条
  • [21] HOE: HOT-GUIDED SYMBOLIC EXECUTION
    Yang, Jun
    Cheng, Shaoyin
    Jiang, Fan
    Luo, Peijie
    [J]. FIFTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER THEORY AND ENGINEERING (ICACTE 2012), 2012, : 887 - 894
  • [22] SymWalker: Symbolic Execution in Routines of Binary Code
    Ma, Jinxin
    Dong, Guowei
    Zhang, Puhan
    Guo, Tao
    [J]. 2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, : 694 - 698
  • [23] Distributed Symbolic Execution for Binary Software Testing
    Wu, Bo
    Li, Mengjun
    Zhang, Bin
    Zhang, Quan
    Tang, Chaojing
    [J]. 2014 IEEE WORKSHOP ON ELECTRONICS, COMPUTER AND APPLICATIONS, 2014, : 618 - 621
  • [24] Real-world study: from real-world data to real-world evidence
    Wen, Yi
    [J]. TRANSLATIONAL BREAST CANCER RESEARCH, 2020, 1
  • [25] Real-World Battles with Real-World Data
    Brown, Jeffrey
    Bate, Andrew
    Platt, Robert
    Raebel, Marsha
    Sauer, Brian
    Trifiro, Gianluca
    [J]. PHARMACOEPIDEMIOLOGY AND DRUG SAFETY, 2017, 26 : 254 - 255
  • [26] Improving the Efficiency of Program Analysis with Symbolic Execution
    Fedorov, Alexey
    Kokin, Vitaliy
    Andrianov, Andrey
    Vysochkin, Alexey
    [J]. PROCEEDINGS OF THE 2017 IEEE RUSSIA SECTION YOUNG RESEARCHERS IN ELECTRICAL AND ELECTRONIC ENGINEERING CONFERENCE (2017 ELCONRUS), 2017, : 390 - 393
  • [27] Symbolic analysis for increased program execution performance
    Psarris, Kleanthis
    [J]. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, PROCEEDINGS, 2008, 5022 : 318 - 318
  • [28] Program Transformation Based on Symbolic Execution and Deduction
    Ji, Ran
    Haehnle, Reiner
    Bubel, Richard
    [J]. SOFTWARE ENGINEERING AND FORMAL METHODS, SEFM 2013, 2013, 8137 : 289 - 304
  • [29] Differential Program Analysis with Fuzzing and Symbolic Execution
    Noller, Yannic
    [J]. PROCEEDINGS OF THE 2018 33RD IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMTED SOFTWARE ENGINEERING (ASE' 18), 2018, : 944 - 947
  • [30] FORMAL PROGRAM VERIFICATION USING SYMBOLIC EXECUTION
    DANNENBERG, RB
    ERNST, GW
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1982, 8 (01) : 43 - 52