SymQEMU: Compilation-based symbolic execution for binaries

S Poeplau, A Francillon - NDSS 2021, Network and Distributed System …, 2021 - hal.science
… The remainder of the paper is structured as follows: We first review symbolic execution in
general, as well as the binaryonly flavor in particular, and existing implementations thereof (…

Binsec/rel: Efficient relational symbolic execution for constant-time at binary-level

LA Daniel, S Bardin, T Rezk - 2020 IEEE Symposium on …, 2020 - ieeexplore.ieee.org
… In this section, we present the basics of contant-time and symbolic execution. Small examples
of CT and standard adaptations of symbolic execution are presented in Section III, while a …

Learning to fuzz from symbolic execution with application to smart contracts

J He, M Balunović, N Ambroladze, P Tsankov… - Proceedings of the …, 2019 - dl.acm.org
Symbolic execution is thorough but slow and often does … symbolic execution, by phrasing
the learning task in the framework of imitation learning. During learning, a symbolic execution

CaSym: Cache aware symbolic execution for side channel detection and mitigation

R Brotzman, S Liu, D Zhang, G Tan… - 2019 IEEE Symposium …, 2019 - ieeexplore.ieee.org
… information that is crucial for applying mitigation techniques to vulnerable software. We
propose CaSym, a cache-aware symbolic execution to identify and report precise information …

Survey of automated vulnerability detection and exploit generation techniques in cyber reasoning systems

TN Brooks - Intelligent Computing: Proceedings of the 2018 …, 2019 - Springer
symbolic execution, a technique known concolic execution [17]. Another approach combines
the use of dynamic symbolic execution … This technique uses dynamic symbolic execution to …

KLEESpectre: Detecting information leakage through speculative cache attacks via symbolic execution

G Wang, S Chattopadhyay, AK Biswas, T Mitra… - ACM Transactions on …, 2020 - dl.acm.org
Symbolic execution is a well-known test generation method to cover program paths at the …
, we extend symbolic execution with modeling of cache and speculative execution. Our tool …

{SmarTest}: Effectively hunting vulnerable transaction sequences in smart contracts through language {Model-Guided} symbolic execution

S So, S Hong, H Oh - … USENIX Security Symposium (USENIX Security 21 …, 2021 - usenix.org
… A few symbolic execution tools (eg [3… sequences effectively, we present a novel technique
that guides symbolic execution with language models. Basically, our technique exhaustively …

Symbolic execution with {SymCC}: Don't interpret, compile!

S Poeplau, A Francillon - 29th USENIX Security Symposium (USENIX …, 2020 - usenix.org
… in modern implementations of symbolic execution [45]. We propose an alternative execution
method and show that it leads to considerably faster symbolic execution and ultimately to …

Extracting relational explanations from deep neural networks: A survey from a neural-symbolic perspective

J Townsend, T Chaton… - IEEE transactions on …, 2019 - ieeexplore.ieee.org
… by explaining the relevance of neural-symbolic extraction methods. Furthermore, our survey
is distinct from another recent survey on NSI [15] in two ways—first, that we focus specifically …

Manticore: A user-friendly symbolic execution framework for binaries and smart contracts

M Mossberg, F Manzano, E Hennenfent… - 2019 34th IEEE/ACM …, 2019 - ieeexplore.ieee.org
… dynamic symbolic execution—a technique that uses constraint solving to systematically
explore a program’s state space. We introduce an open-source dynamic symbolic execution