Research Article

An Exploitability Analysis Technique for Binary Vulnerability Based on Automatic Exception Suppression

Algorithm 1

Supervised symbolic execution.
Input: Trace list logged by real execution
Output: None
(1) ≔ current address of symbolic execution
(2) ≔ step size of symbolic execution
(3) Bb ≔ the count of basic block, Bb = 0
(4) load the target binary
(5) symbolically execute the binary until ==
(6) while == [Bb]
(7)  Bb = Bb + 1
(8)   = [Bb] – [Bb − 1]
(9)    = the address after symbolic execution for step size
(10)   if Bb >= len() or crash occurred
(11)     return crash state
(12) if !=
(13)   call Path_correct()
(14) End