作者
Bogdan Copos, Praveen Murthy
发表日期
2015
研讨会论文
Program Protection and Reverse Engineering Workshop
卷号
5
出版商
ACM
简介
The effectiveness of many dynamic program analysis techniques depends heavily on the completeness of the test suite applied during the analysis process. Test suites are often composed by developers and aim at testing all of the functionality of a software system. However, test suites may not be complete, if they exist at all. To date, only two methods exist for automatically generating test input for closed binaries: fuzzing and symbolic execution. Despite previous successes of these methods in identifying bugs, both techniques have limitations. In this paper, we propose a new method for autonomously generating valid input and identifying protocols for closed x86 binaries. The method presented can be used as a standalone tool or can be combined with other techniques for improved results. To assess its effectiveness, we test InputFinder, the implementation of our method, against binaries from the DARPA Cyber …
引用总数
201720182019202020212022202320241141312
学术搜索中的文章
B Copos, P Murthy - Proceedings of the 5th Program Protection and …, 2015