Research Article
An Exploitability Analysis Technique for Binary Vulnerability Based on Automatic Exception Suppression
Algorithm 1
Supervised symbolic execution.
Input: Trace list logged by real execution | Output: None | (1) ≔ current address of symbolic execution | (2) ≔ step size of symbolic execution | (3) Bb ≔ the count of basic block, Bb = 0 | (4) load the target binary | (5) symbolically execute the binary until == | (6) while == [Bb] | (7) Bb = Bb + 1 | (8) = [Bb] – [Bb − 1] | (9) = the address after symbolic execution for step size | (10) if Bb >= len() or crash occurred | (11) return crash state | (12) if != | (13) call Path_correct() | (14) End |
|