We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

Binary analysis with angr

Formale Metadaten

Titel
Binary analysis with angr
Untertitel
Using VEX for static analysis
Serientitel
Anzahl der Teile
611
Autor
Lizenz
CC-Namensnennung 2.0 Belgien:
Sie dürfen das Werk bzw. den Inhalt zu jedem legalen Zweck nutzen, verändern und in unveränderter oder veränderter Form vervielfältigen, verbreiten und öffentlich zugänglich machen, sofern Sie den Namen des Autors/Rechteinhabers in der von ihm festgelegten Weise nennen.
Identifikatoren
Herausgeber
Erscheinungsjahr
Sprache
Produktionsjahr2017

Inhaltliche Metadaten

Fachgebiet
Genre
Abstract
The angr binary analysis platform (http://angr.io) uses libVEX as the base ofits analysis engine. In this talk, we discuss the things about VEX that makeit attractive for static analysis and symbolic execution, its pitfalls, andways that it can be improved, including the changes we have made in our forkof libVEX. Agenda * The goals of static analysis and symbolic execution on binary code * Brief overview of competing analysis IRs * Design of angr structured around libVEX * PyVEX, FFI wrapper of libVEX objects into python * simuvex, symbolic implementation of most VEX operations, ccalls, and dirty calls * Pitfalls we've encountered * VEX is not truly SSA * libVEX is not designed for fault tolerance * libVEX's multiarch support is a little shoddy * Licensing concerns * Our patches to libVEX * The only real thing stopping us from submitting our patches upstream is manpower * The possibility of a simplified python interface for writing lifters * angr * symbolic execution * static analyses * control-flow recovery * binary rewriting * type inference (sort of) * value-set analysis