发明名称 |
DETECTING EXPLOITABLE BUGS IN BINARY CODE |
摘要 |
Systems and methods for performing hybrid symbolic execution to detect exploitable bugs in binary code are described. In some example embodiments, the systems and methods determine that resources associated with an execution client performing symbolic execution of a target program are below, at, or above a threshold performance level, generate checkpoints for active executing paths of the online symbolic execution, and cause the execution client to perform symbolic execution in response to the determination that the resources are at or above the threshold performance level. |
申请公布号 |
US2016196433(A1) |
申请公布日期 |
2016.07.07 |
申请号 |
US201514827522 |
申请日期 |
2015.08.17 |
申请人 |
Carnegie Mellon University |
发明人 |
Brumley David;Cha Sang Kil;Avgerinos Thanassis;Rebert Alexandre |
分类号 |
G06F21/57;G06F21/51 |
主分类号 |
G06F21/57 |
代理机构 |
|
代理人 |
|
主权项 |
1. A system comprising:
a hardware memory; and one or more hardware processors coupled to the hardware memory and configured to perform operations comprising: selecting a portion of a symbolic memory resource based on an analysis of symbolic memory cells of the symbolic memory resource; and by symbolic execution, determining a set of values that are referenced by the selected portion of the symbolic memory resource. |
地址 |
Pittsburgh PA US |