PPT-1 Symbolic Execution
Author : olivia-moreira | Published Date : 2016-04-09
Kevin Wallace CSE504 20100428 2 Problem Attackerfacing code must be written to guard against all possible inputs There are many execution paths not a single one
Presentation Embed Code
Download Presentation
Download Presentation The PPT/PDF document "1 Symbolic Execution" is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.
1 Symbolic Execution: Transcript
Kevin Wallace CSE504 20100428 2 Problem Attackerfacing code must be written to guard against all possible inputs There are many execution paths not a single one should lead to a vulnerability. 1E+2 De-Cloaking Internet Malware. Presenter: Yinzhi Cao. Slides by Ben . Livshits . with . Clemens . Kolbitsch, Ben Zorn,. Christian Seifert, Paul . Rebriy. Microsoft Research. Static – Dynamic Analysis Spectrum. Corina. . Pasareanu. Carnegie Mellon/NASA Ames. c. orina.s.pasareanu@nasa.gov. Overview. “Classical” symbolic execution and its variants. Generalized symbolic execution . D. ynamic and . concolic. Todd Frederick. Vulnerabilities are everywhere…. 2. Binary Concolic Execution. rtm. Robert Morris. An exploit. 3. Binary Concolic Execution. DD8F2F736800DD8F2F62696ED05E5ADD00DD00DD5ADD03D05E5CBC3B. for .NET. Nikolai Tillmann, Microsoft Research. SMT 2008. 2. Background: Unit Testing. A unit test is a small program with assertions.. void . AddTest. (). {. . . HashSet. set = new . HashSet. (but might have been afraid to ask). IEEE S&P 2010. Overview. Two Main Contributions. Precisely describe the algorithms for dynamic taint analysis and forward symbolic execution as extensions to the run-time semantics of a general language. Contents . Vector processor. Vector instructions. Vector pipelines. Scalar pipeline execution. Vector pipeline execution. Symbolic processors. Attributes. Characteristics. Vector Processors. A vector processor is specially designed to perform vector computations.. Subodh Sharma. Indian Institute of Technology Delhi. State merging, . Concolic. Execution. Concolic. Execution. Works well on . interprocedural. bugs, use of library calls. Concolic. Execution. Falls back on concrete values when . Towards Automatic Signature Generation. of Vulnerability-based Signature. Dynamic Analysis. Unleashing Mayhem on Binary Code. Automatic exploit detection: attack and defense. Static and Dynamic Analysis. Edward J. Schwartz, . Thanassis. Avgerinos, David . Brumley. Presented by: . Haitao Xu. 1. The Root of All Evil. Humans write programs. This Talk:. Computers Analyzing Programs Dynamically at Runtime. Cristian. . Cadar. , Patrice . Godefroid. , . Sarfraz. . Khurshid. , . Corina. . Pasareanu. , . Koushik. . Sen. , Nikolai . Tillmann. , Willem . Visser. Overview. S. ymbolic execution and its variants. Analysis of . Closed-Loop Control Software. Aditya Zutshi. Sriram Sankaranarayanan . 1. Xiaoqing . Jin. Jyotirmoy Deshmukh. Sampled Data Control Systems. Controller. . Plant. . D/A. A/D. . . Elided to examples only. Example. typedef struct cell { . int v; . struct cell *next;. } cell;. int f(int v) { . return 2*v + 1;. }. int . testme. (cell *p, int x) {. if (x > 0). if (p != NULL). c // symbolic3int x 0 y 0 z 04if a 5 x -267if b 5 8 if a c y 1 9 z 21011assertxyz3x0 y0 z0x-2z2y1z2z2tftftftfpath condition55Why Is This PossibleThere are very powerful
Download Document
Here is the link to download the presentation.
"1 Symbolic Execution"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.
Related Documents