Directed Symbolic Execution for Binary Vulnerability Mining

Bo Wu,Mengjun Li,Bin Zhang,Quan Zhang,Chaojing Tang
DOI: https://doi.org/10.1109/iweca.2014.6845694
2014-01-01
Abstract:Despite more than two decades of independent, academic, and industry-related research, software vulnerabilities remain the main reason that undermine the security of our systems. Taint analysis and symbolic execution are among the most promising approaches for vulnerability detection, but either one can't remit the problem separately. In this paper, we try to combine taint analysis and symbolic execution for binary vulnerability mining and proposed a method named directed symbolic execution. Our three-step approach firstly adopts dynamic taint analysis technology to identify the safety-related data, and then uses symbolic execution system to execute the binary software while marks those safety-related data as symbols, and finally discovers vulnerabilities with our check-model. The evaluation shows that our method can be used to detect vulnerabilities in binary software more efficiently.
What problem does this paper attempt to address?