Symbolic Execution is powerful technique that explores all possible execution paths without actual inputs. An interesting display of this technique is below:
#malware #reverseengineering #cybersecurity #infosec #symbolicexecution
Symbolic Execution is powerful technique that explores all possible execution paths without actual inputs. An interesting display of this technique is below:
#malware #reverseengineering #cybersecurity #infosec #symbolicexecution
Here's a pre-print of our DATE'25 paper where we present BinSym, a symbolic executor for RISC-V binary code that is based on a formal (yet executable) description of RISC-V instruction semantics in Haskell: https://www.ibr.cs.tu-bs.de/vss/Publications/2025/tempel_25_binsym.pdf
💪 #ARM yourself with knowledge about #SymbolicExecution! Get hands-on experience with Jeremy Blackthorne's #training "Symbolic Execution with #angr on Real-World Targets", and learn how to perform symbolic and concolic execution with angr!
🎟️ https://ringzer0.training/trainings/symbolic-execution-with-angr.html
Symbolic execution is an incredibly powerful reversing technique, but it can also seem overwhelming to get into. Angr makes it simple, and it can be naturally integrated with your existing workflow. In this training, we cover how to use angr to do malware deobfuscation, find vulnerabilities, perform exploitation, and general RE.
Also, #SymbolicExecution of even small #binaries is very slow and would only, probably, help for comparing binaries for the same (or compatible) architecture. And in order to compare binaries for the same architectures you have a myriad of different, not terribly slow, ways for doing #BinDiffing.
Dear everyone in the academia (and maybe elsewhere) doing #bindiffing research: #SymbolicExecution does not work for comparing different architectures, unless you are using as input for your symbolic execution tool *decompiled code*.
If you are using assembly or using an IR (Intermediate Representation) based on assembler (like Ghidra' p-code, IDA's microcode, LLVM's IR, etc), it will inevitably produce different outputs.
Your best IR for #diffing is pseudo-code, the #decompiler's output.
💪 #ARM yourself with knowledge about #SymbolicExecution! Get hands-on experience with Jeremy Blackthorne's #training "Symbolic Execution with #angr on Real-World Targets", and learn how to perform symbolic and concolic execution with angr!
🎟️ https://ringzer0.training/trainings/symbolic-execution-with-angr.html
Symbolic execution is an incredibly powerful reversing technique, but it can also seem overwhelming to get into. Angr makes it simple, and it can be naturally integrated with your existing workflow. In this training, we cover how to use angr to do malware deobfuscation, find vulnerabilities, perform exploitation, and general RE.
💪 #ARM yourself with knowledge about #SymbolicExecution! Get hands-on experience with Jeremy Blackthorne's #training "Symbolic Execution with #angr on Real-World Targets". Get your ticket now!
🎟️ https://ringzer0.training/trainings/symbolic-execution-with-angr.html
Symbolic execution is an incredibly powerful reversing technique, but it can also seem overwhelming to get into. Angr makes it simple, and it can be naturally integrated with your existing workflow. In this training, we cover how to use angr to do malware deobfuscation, find vulnerabilities, perform exploitation, and general RE.
💪 #ARM yourself with knowledge about #SymbolicExecution! Get hands-on experience with Jeremy Blackthorne's #training "Symbolic Execution with #angr on Real-World Targets". Get your ticket now!
🎟️ https://ringzer0.training/trainings/symbolic-execution-with-angr.html
Symbolic execution is an incredibly powerful reversing technique, but it can also seem overwhelming to get into. Angr makes it simple, and it can be naturally integrated with your existing workflow. In this training, we cover how to use angr to do malware deobfuscation, find vulnerabilities, perform exploitation, and general RE.
📢 Don’t forget to sign up for one of our advanced hands-on #infosec trainings! The final week of #RETURN23XPLOIT is only a few days away. Our trainings offer hands-on instruction from top industry experts. Learn all about #Ventura #Exploitation, #SymbolicExecution, #ReverseEngineering, #Cryptography & more. Don't miss out - register now!