On Symbolic Execution of Decompiled Programs
Authors | |
---|---|
Year of publication | 2020 |
Type | Article in Proceedings |
Conference | Proceedings - 2020 IEEE 20th International Conference on Software Quality, Reliability, and Security, QRS 2020 |
MU Faculty or unit | |
Citation | |
Doi | http://dx.doi.org/10.1109/QRS51102.2020.00044 |
Keywords | symbolic execution; decompilation; model checking; llvm |
Description | In this paper, we present a combination of existing and new tools that together make it possible to apply formal verification methods to programs in the form of x86_64 machine code. Our approach first uses a decompilation tool (remill) to extract low-level intermediate representation (LLVM) from the machine code. This step consists of instruction translation(i.e. recovery of operation semantics), control flow extraction and address identification. The main contribution of this paper is the second step, which builds on data flow analysis and refinement of indirect (i.e. data-dependent) control flow. This step makes the processed bitcode much more amenable to formal analysis.To demonstrate the viability of our approach, we have compiled a set of benchmark programs into native executables and analysed them using two LLVM-based tools: DIVINE, a software model checker and KLEE, a symbolic execution engine. We have compared the outcomes to direct analysis of the same programs. |
Related projects: |