Did a presentation today on #symbolicexecution and demo'd some of the fine work by #angr as well as some interesting results from the #vsharp team. Not totally sure how the talk went with the audience; but, I'm trying to decide if I want to make some changes & maybe I put in for the Cactus Con CFP which is currently open.

I think idea be interested in showing some reversing analyses like deobfuscating some obfuscated malware maybe? I'm not sure if my skill with some of these tools is quite there yet though.

Still waiting for the call for paper for Tests and Proofs (TAP) conference? Wait no longer: we are thrilled to announce that TAP is now a track at FM 2026: https://conf.researchr.org/track/fm-2026/fm-2026-tap#Call-for-Papers

#FormalMethods #SoftwareTesting #Verification #Proof #SymbolicExecution #FM2026 #TAP2026

FM 2026 - Special Track on TAP (Tests and Proofs) - FM 2026

FM 2026 welcomes a special track for the TAP (Tests and Proofs) conference series.

After reading angr docs for the better part of the day, I was able to solve OverTheWire's Leviathan levels 1->2 and 6->7. Not 3->4 so far, but that's left for tomorrow. It's definitely an exciting journey!

Wanna join in? Read up at https://docs.angr.io/en/latest/ and drop me a line!

#ctf #cybersecurity #overthewire #leviathan #angr #symbolicexecution

angr documentation

Symbolic Execution is powerful technique that explores all possible execution paths without actual inputs. An interesting display of this technique is below:

https://doar-e.github.io/blog/2014/10/11/taiming-a-wild-nanomite-protected-mips-binary-with-symbolic-execution-no-such-crackme/

#malware #reverseengineering #cybersecurity #infosec #symbolicexecution

Taming a wild nanomite-protected MIPS binary with symbolic execution: No Such Crackme

Using Klee on Rust Programs

Survey of where we are in this effort

💪 #ARM yourself with knowledge about #SymbolicExecution! Get hands-on experience with Jeremy Blackthorne's #training "Symbolic Execution with #angr on Real-World Targets", and learn how to perform symbolic and concolic execution with angr!

🎟️ https://ringzer0.training/trainings/symbolic-execution-with-angr.html

Ringzer0 - Symbolic Execution with angr on Real-World Targets

Symbolic execution is an incredibly powerful reversing technique, but it can also seem overwhelming to get into. Angr makes it simple, and it can be naturally integrated with your existing workflow. In this training, we cover how to use angr to do malware deobfuscation, find vulnerabilities, perform exploitation, and general RE.

Also, #SymbolicExecution of even small #binaries is very slow and would only, probably, help for comparing binaries for the same (or compatible) architecture. And in order to compare binaries for the same architectures you have a myriad of different, not terribly slow, ways for doing #BinDiffing.

#BinaryDiffing

Dear everyone in the academia (and maybe elsewhere) doing #bindiffing research: #SymbolicExecution does not work for comparing different architectures, unless you are using as input for your symbolic execution tool *decompiled code*.

If you are using assembly or using an IR (Intermediate Representation) based on assembler (like Ghidra' p-code, IDA's microcode, LLVM's IR, etc), it will inevitably produce different outputs.

Your best IR for #diffing is pseudo-code, the #decompiler's output.

💪 #ARM yourself with knowledge about #SymbolicExecution! Get hands-on experience with Jeremy Blackthorne's #training "Symbolic Execution with #angr on Real-World Targets", and learn how to perform symbolic and concolic execution with angr!

🎟️ https://ringzer0.training/trainings/symbolic-execution-with-angr.html

Ringzer0 - Symbolic Execution with angr on Real-World Targets

Symbolic execution is an incredibly powerful reversing technique, but it can also seem overwhelming to get into. Angr makes it simple, and it can be naturally integrated with your existing workflow. In this training, we cover how to use angr to do malware deobfuscation, find vulnerabilities, perform exploitation, and general RE.

💪 #ARM yourself with knowledge about #SymbolicExecution! Get hands-on experience with Jeremy Blackthorne's #training "Symbolic Execution with #angr on Real-World Targets". Get your ticket now!

🎟️ https://ringzer0.training/trainings/symbolic-execution-with-angr.html

Ringzer0 - Symbolic Execution with angr on Real-World Targets

Symbolic execution is an incredibly powerful reversing technique, but it can also seem overwhelming to get into. Angr makes it simple, and it can be naturally integrated with your existing workflow. In this training, we cover how to use angr to do malware deobfuscation, find vulnerabilities, perform exploitation, and general RE.