DOAJ
Open Access
2022
SENinja: A symbolic execution plugin for Binary Ninja
Luca Borzacchiello
Emilio Coppa
Camil Demetrescu
Abstrak
Symbolic execution is a program analysis technique that aims to automatically identify interesting inputs for an application, using them to generate program executions covering different parts of the code. It is widely used in the context of vulnerability discovery and reverse engineering. In this paper we present SENinja, a symbolic execution plugin for the BinaryNinja disassembler. The tool allows the user to perform symbolic execution analyses directly within the user interface of the disassembler, and can be used to support a variety of reverse engineering tasks.
Topik & Kata Kunci
Penulis (3)
L
Luca Borzacchiello
E
Emilio Coppa
C
Camil Demetrescu
Akses Cepat
PDF tidak tersedia langsung
Cek di sumber asli →Informasi Jurnal
- Tahun Terbit
- 2022
- Sumber Database
- DOAJ
- DOI
- 10.1016/j.softx.2022.101219
- Akses
- Open Access ✓