
Ð”Ð°Ð½Ð½Ð°Ñ Ñ€Ð°Ð±Ð¾Ñ‚Ð° поÑвÑщена иÑÑледованию и разработке метода обратного Ñимвольного Ð²Ñ‹Ð¿Ð¾Ð»Ð½ÐµÐ½Ð¸Ñ ÐºÐ°Ðº метода оптимизации Ñимвольного Ð²Ñ‹Ð¿Ð¾Ð»Ð½ÐµÐ½Ð¸Ñ Ð´Ð»Ñ Ð¿Ð¾Ð¸Ñка ошибок в иÑполнÑемом бинарном коде. Ð’ оÑнове предложенного метода лежит Ð¸Ð´ÐµÑ Ð¸ÑÐ¿Ð¾Ð»ÑŒÐ·Ð¾Ð²Ð°Ð½Ð¸Ñ Ñимвольных переменных, взÑÑ‚Ð°Ñ Ð¸Ð· метода Ñимвольного выполнениÑ, и Ð¸Ð´ÐµÑ Ð²Ñ‹Ð¿Ð¾Ð»Ð½ÐµÐ½Ð¸Ñ ÐºÐ¾Ð´Ð° от результатов Ð²Ñ‹Ð¿Ð¾Ð»Ð½ÐµÐ½Ð¸Ñ Ð¿Ñ€Ð¾Ð³Ñ€Ð°Ð¼Ð¼Ñ‹ к ее входным данным. Ð’ результате была предложена Ñ„Ð¾Ñ€Ð¼Ð°Ð»ÑŒÐ½Ð°Ñ Ð¼Ð¾Ð´ÐµÐ»ÑŒ ÑиÑтемы, проанализированы ее преимущеÑтва и недоÑтатки. Также раÑÑмотрены методы ее иÑÐ¿Ð¾Ð»ÑŒÐ·Ð¾Ð²Ð°Ð½Ð¸Ñ Ð² ÑовокупноÑти Ñ ÐºÐ»Ð°ÑÑичеÑким методом Ñимвольного выполнениÑ. По результатам анализа был Ñделан вывод о возможноÑти иÑÐ¿Ð¾Ð»ÑŒÐ·Ð¾Ð²Ð°Ð½Ð¸Ñ Ð¿Ñ€ÐµÐ´Ð»Ð¾Ð¶ÐµÐ½Ð½Ð¾Ð³Ð¾ метода как дополнительного инÑтрумента анализаторов, в оÑнове которых лежит Ð¸Ð´ÐµÑ Ñимвольного выполнениÑ. ОблаÑтью Ð¿Ñ€Ð¸Ð¼ÐµÐ½ÐµÐ½Ð¸Ñ Ð¿Ð¾Ð»ÑƒÑ‡ÐµÐ½Ð½Ñ‹Ñ… результатов ÑвлÑÑŽÑ‚ÑÑ ÑиÑтемы поиÑка ошибок и уÑзвимоÑтей бинарных иÑполнÑемых файлов, а также облаÑть инÑтрументов Ð´Ð»Ñ Ð°Ð²Ñ‚Ð¾Ð¼Ð°Ñ‚Ð¸Ñ‡ÐµÑкого теÑÑ‚Ð¸Ñ€Ð¾Ð²Ð°Ð½Ð¸Ñ Ð¿Ñ€Ð¾Ð³Ñ€Ð°Ð¼Ð¼Ð½Ð¾Ð³Ð¾ обеÑпечениÑ.
This paper investigates and develops the method of reverse symbolic execution as an optimization of the symbolic execution method for finding errors in executable binary code. The proposed method is based on the idea of using symbolic variables, taken from the symbolic execution method, and the idea of executing code from the results of program execution to its input data. As a result, a formal model of the system has been proposed and its advantages and disadvantages were analyzed. The methods for its use in conjunction with the classical symbolic execution method were also considered. Based on the results of the analysis, it was concluded that the proposed method can be used as an additional tool for analyzers that are based on the idea of symbolic execution. The area of application of the results obtained is the search systems for errors and vulnerabilities of binary executable files, as well as the area of tools for automatic testing of software.
обнаÑÑжение ÑÑзвимоÑÑей, опÑимизаÑиÑ, cyber security, кибеÑбезопаÑноÑÑÑ, обÑаÑное ÑимволÑное вÑполнение, vulnerability detection, динамиÑеÑкий анализ, dynamic analysis, reverse symbolic execution, optimization, symbolic execution, ÑимволÑное вÑполнение
обнаÑÑжение ÑÑзвимоÑÑей, опÑимизаÑиÑ, cyber security, кибеÑбезопаÑноÑÑÑ, обÑаÑное ÑимволÑное вÑполнение, vulnerability detection, динамиÑеÑкий анализ, dynamic analysis, reverse symbolic execution, optimization, symbolic execution, ÑимволÑное вÑполнение
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 0 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
