Slides of my talk at @SecuDayLille1 about Dynamic Symbolic Execution
2015-1-17 23:0:0 Author: github.com(查看原文) 阅读量:1 收藏

Abstract: This talk is about binary analysis and instrumentation. We will see how it's possible to target a specific function, snapshot the context memory/registers before the function, translate the instrumentation into an intermediate representation,apply a taint analysis based on this IR, build/keep formulas for a Dynamic Symbolic Execution (DSE), generate a concrete value to go through a specific path, restore the context memory/register and generate another concrete value to go through another path then repeat this operation until the target function is covered.


文章来源: https://github.com/JonathanSalwan/PinTools/tree/master/Talks/SecurityDayLille-2015
如有侵权请联系:admin#unsafe.sh