Symbolic execution is a powerful technique for software analysis and bug detection. Compilation-based symbolic execution is a recently proposed flavor that has been shown to improve the performance of symbolic execution significantly when source code is available. We demonstrate a novel technique to enable compilation-based symbolic execution of binaries (i.e., without the need for source code). Our system, SymQEMU, builds on top of QEMU, modifying the intermediate representation of the target program before translating it to the host architecture. This enables SymQEMU to compile symbolic-execution capabilities into binaries and reap the associated performance benefits while maintaining architecture independence. We present our approach and implementation, and we show that it outperforms the state-of-the-art binary symbolic executors S2E and QSYM with statistical significance; on some benchmarks, it even achieves better performance than the source-based SymCC. Moreover, our tool has found a previously unknown vulnerability in the well-tested libarchive library, demonstrating its utility in testing real-world software.
SymQEMU: Compilation-based symbolic execution for binaries
NDSS 2021, Network and Distributed System Security Symposium, 21-24 February 2021, Virtual Conference
© ISOC. Personal use of this material is permitted. The definitive version of this paper was published in NDSS 2021, Network and Distributed System Security Symposium, 21-24 February 2021, Virtual Conference and is available at :
PERMALINK : https://www.eurecom.fr/publication/6459