Symbolic Execution is powerful technique that explores all possible execution paths without actual inputs. An interesting display of this technique is below:

https://doar-e.github.io/blog/2014/10/11/taiming-a-wild-nanomite-protected-mips-binary-with-symbolic-execution-no-such-crackme/

#malware #reverseengineering #cybersecurity #infosec #symbolicexecution

Taming a wild nanomite-protected MIPS binary with symbolic execution: No Such Crackme

Here's a pre-print of our DATE'25 paper where we present BinSym, a symbolic executor for RISC-V binary code that is based on a formal (yet executable) description of RISC-V instruction semantics in Haskell: https://www.ibr.cs.tu-bs.de/vss/Publications/2025/tempel_25_binsym.pdf

#RISCV #Haskell #SymbolicExecution #DATE25

Using Klee on Rust Programs

Survey of where we are in this effort

💪 #ARM yourself with knowledge about #SymbolicExecution! Get hands-on experience with Jeremy Blackthorne's #training "Symbolic Execution with #angr on Real-World Targets", and learn how to perform symbolic and concolic execution with angr!

🎟️ https://ringzer0.training/trainings/symbolic-execution-with-angr.html

Ringzer0 - Symbolic Execution with angr on Real-World Targets

Symbolic execution is an incredibly powerful reversing technique, but it can also seem overwhelming to get into. Angr makes it simple, and it can be naturally integrated with your existing workflow. In this training, we cover how to use angr to do malware deobfuscation, find vulnerabilities, perform exploitation, and general RE.

Also, #SymbolicExecution of even small #binaries is very slow and would only, probably, help for comparing binaries for the same (or compatible) architecture. And in order to compare binaries for the same architectures you have a myriad of different, not terribly slow, ways for doing #BinDiffing.

#BinaryDiffing

Dear everyone in the academia (and maybe elsewhere) doing #bindiffing research: #SymbolicExecution does not work for comparing different architectures, unless you are using as input for your symbolic execution tool *decompiled code*.

If you are using assembly or using an IR (Intermediate Representation) based on assembler (like Ghidra' p-code, IDA's microcode, LLVM's IR, etc), it will inevitably produce different outputs.

Your best IR for #diffing is pseudo-code, the #decompiler's output.

💪 #ARM yourself with knowledge about #SymbolicExecution! Get hands-on experience with Jeremy Blackthorne's #training "Symbolic Execution with #angr on Real-World Targets", and learn how to perform symbolic and concolic execution with angr!

🎟️ https://ringzer0.training/trainings/symbolic-execution-with-angr.html

Ringzer0 - Symbolic Execution with angr on Real-World Targets

Symbolic execution is an incredibly powerful reversing technique, but it can also seem overwhelming to get into. Angr makes it simple, and it can be naturally integrated with your existing workflow. In this training, we cover how to use angr to do malware deobfuscation, find vulnerabilities, perform exploitation, and general RE.

💪 #ARM yourself with knowledge about #SymbolicExecution! Get hands-on experience with Jeremy Blackthorne's #training "Symbolic Execution with #angr on Real-World Targets". Get your ticket now!

🎟️ https://ringzer0.training/trainings/symbolic-execution-with-angr.html

Ringzer0 - Symbolic Execution with angr on Real-World Targets

Symbolic execution is an incredibly powerful reversing technique, but it can also seem overwhelming to get into. Angr makes it simple, and it can be naturally integrated with your existing workflow. In this training, we cover how to use angr to do malware deobfuscation, find vulnerabilities, perform exploitation, and general RE.

💪 #ARM yourself with knowledge about #SymbolicExecution! Get hands-on experience with Jeremy Blackthorne's #training "Symbolic Execution with #angr on Real-World Targets". Get your ticket now!

🎟️ https://ringzer0.training/trainings/symbolic-execution-with-angr.html

Ringzer0 - Symbolic Execution with angr on Real-World Targets

Symbolic execution is an incredibly powerful reversing technique, but it can also seem overwhelming to get into. Angr makes it simple, and it can be naturally integrated with your existing workflow. In this training, we cover how to use angr to do malware deobfuscation, find vulnerabilities, perform exploitation, and general RE.

📢 Don’t forget to sign up for one of our advanced hands-on #infosec trainings! The final week of #RETURN23XPLOIT is only a few days away. Our trainings offer hands-on instruction from top industry experts. Learn all about #Ventura #Exploitation, #SymbolicExecution, #ReverseEngineering, #Cryptography & more. Don't miss out - register now!

https://ringzer0.training/

#cybersecurity #training

Ringzer0

Low level learning from the experts. Austin, Las Vegas, Online.

Ringzer0