Symbolic execution is a program analysis technique that aims to automatically identify interesting inputs for an application, using them to generate program executions covering different parts of the code. It is widely used in the context of vulnerability discovery and reverse engineering. In this paper we present SENINJA, a symbolic execution plugin for the BINARYNINJA disassembler. The tool allows the user to perform symbolic execution analyses directly within the user interface of the disassembler, and can be used to support a variety of reverse engineering tasks.
SENinja: A symbolic execution plugin for Binary Ninja / Borzacchiello, L.; Coppa, E.; Demetrescu, C.. - In: SOFTWAREX. - ISSN 2352-7110. - 20:(2022). [10.1016/j.softx.2022.101219]
SENinja: A symbolic execution plugin for Binary Ninja
Borzacchiello L.
;Coppa E.;Demetrescu C.
2022
Abstract
Symbolic execution is a program analysis technique that aims to automatically identify interesting inputs for an application, using them to generate program executions covering different parts of the code. It is widely used in the context of vulnerability discovery and reverse engineering. In this paper we present SENINJA, a symbolic execution plugin for the BINARYNINJA disassembler. The tool allows the user to perform symbolic execution analyses directly within the user interface of the disassembler, and can be used to support a variety of reverse engineering tasks.File | Dimensione | Formato | |
---|---|---|---|
Borzacchiello_SENinja_2022.pdf
accesso aperto
Tipologia:
Versione editoriale (versione pubblicata con il layout dell'editore)
Licenza:
Creative commons
Dimensione
1.7 MB
Formato
Adobe PDF
|
1.7 MB | Adobe PDF |
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.