A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
SyML: Guiding Symbolic Execution Toward Vulnerable States Through Pattern Learning
2021
24th International Symposium on Research in Attacks, Intrusions and Defenses
Exploring many execution paths in a binary program is essential to discover new vulnerabilities. Dynamic Symbolic Execution (DSE) is useful to trigger complex input conditions and enables an accurate exploration of a program while providing extensive crash replayability and semantic insights. However, scaling this type of analysis to complex binaries is difficult. Current methods suffer from the path explosion problem, despite many attempts to mitigate this challenge (e.g., by merging paths
doi:10.1145/3471621.3471865
fatcat:zy5oktr57vhz7ohfc2to5no6yq