We will talk about how we use symbolic execution in BINSEC at USE'18 @ ICST'18.
Here are the slides of the presentation..
For more, this presentation is a mashup of different results obtained by our group during the last 2 years from the following articles.
Backward-bounded DSE: Targeting Infeasibility Questions on Obfuscated Codes. Robin David, Sébastien Bardin, Jean-Yves Marion. SP 2017. Finding the needle in the heap: combining static analysis and dynamic symbolic execution to trigger use-after-free.
There will be a BINSEC tutorial @ SSPREW-7.
The tutorial uses a virtual machine which contains a compiled development snapshot of BINSEC and some examples.
You can download it from ftp://ftp.cea.fr/incoming/y2k01/binsec_ssprew.ova (md5: 8d473d800b1fd2d3a2a929a51d1cb990).
username : vagrant password : vagrant The examples are found in the examples directory.
The above link will be active for 2 weeks only from November, 30.
Here are the slides.
We --- my colleague Sébastien and I --- are organizing the 8th International Summer School on Information Security and Protection.
For those of you interested in software protection in particular and in analyzing binary code in general, this is a great opportunity to meet some of the best academics and professionals of the domain.
For more information about ISSISP '17, the website is up and running there.