2017 IEEE Cybersecurity Development (SecDev) 2017
DOI: 10.1109/secdev.2017.14
|View full text |Cite
|
Sign up to set email alerts
|

Angr - The Next Generation of Binary Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
38
0
1

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 63 publications
(39 citation statements)
references
References 1 publication
0
38
0
1
Order By: Relevance
“…At the other extreme of program transparency, White-Box fuzzers [11] and symbolic execution tools [2,9,20,21,23,28] like KLEE [6] and SAGE [14] symbolically manipulate the source code to deterministically discover input sequences that explore every code path. As they are able to walk the entire source code tree, they can discover bugs in nested code.…”
Section: Fuzzing Overviewmentioning
confidence: 99%
“…At the other extreme of program transparency, White-Box fuzzers [11] and symbolic execution tools [2,9,20,21,23,28] like KLEE [6] and SAGE [14] symbolically manipulate the source code to deterministically discover input sequences that explore every code path. As they are able to walk the entire source code tree, they can discover bugs in nested code.…”
Section: Fuzzing Overviewmentioning
confidence: 99%
“…We implemented Legion as a prototype in Python 3 on top of the symbolic execution engine angr [8]. We have extended its solver backend, claripy, by the approximate path-preserving fuzzing algorithm, relying on the optimizer component of Z3 [2].…”
Section: Tool Description and Configurationmentioning
confidence: 99%
“…For binary files, we perform a symbolic summarization of each function present in the binary using an integration of static analysis and symbolic execution based on Angr [70]. Specifically, we conduct a multi-path exploration of each function with the goal of discovering references to a set of predetermined features, including strings, constants, functions, and external variables.…”
Section: Source Vs Binary Matchingmentioning
confidence: 99%