DOAJ Open Access 2022

SENinja: A symbolic execution plugin for Binary Ninja

Luca Borzacchiello Emilio Coppa Camil Demetrescu

Abstrak

Symbolic execution is a program analysis technique that aims to automatically identify interesting inputs for an application, using them to generate program executions covering different parts of the code. It is widely used in the context of vulnerability discovery and reverse engineering. In this paper we present SENinja, a symbolic execution plugin for the BinaryNinja disassembler. The tool allows the user to perform symbolic execution analyses directly within the user interface of the disassembler, and can be used to support a variety of reverse engineering tasks.

Topik & Kata Kunci

Penulis (3)

L

Luca Borzacchiello

E

Emilio Coppa

C

Camil Demetrescu

Format Sitasi

Borzacchiello, L., Coppa, E., Demetrescu, C. (2022). SENinja: A symbolic execution plugin for Binary Ninja. https://doi.org/10.1016/j.softx.2022.101219

Akses Cepat

PDF tidak tersedia langsung

Cek di sumber asli →
Lihat di Sumber doi.org/10.1016/j.softx.2022.101219
Informasi Jurnal
Tahun Terbit
2022
Sumber Database
DOAJ
DOI
10.1016/j.softx.2022.101219
Akses
Open Access ✓