On Symbolic Execution of Decompiled Programs

Investor logo

Warning

This publication doesn't include Faculty of Arts. It includes Faculty of Informatics. Official publication website can be found on muni.cz.
Authors

KORENČIK Lukáš ROČKAI Petr LAUKO Henrich BARNAT Jiří

Year of publication 2020
Type Article in Proceedings
Conference Proceedings - 2020 IEEE 20th International Conference on Software Quality, Reliability, and Security, QRS 2020
MU Faculty or unit

Faculty of Informatics

Citation
Doi http://dx.doi.org/10.1109/QRS51102.2020.00044
Keywords symbolic execution; decompilation; model checking; llvm
Description In this paper, we present a combination of existing and new tools that together make it possible to apply formal verification methods to programs in the form of x86_64 machine code. Our approach first uses a decompilation tool (remill) to extract low-level intermediate representation (LLVM) from the machine code. This step consists of instruction translation(i.e. recovery of operation semantics), control flow extraction and address identification. The main contribution of this paper is the second step, which builds on data flow analysis and refinement of indirect (i.e. data-dependent) control flow. This step makes the processed bitcode much more amenable to formal analysis.To demonstrate the viability of our approach, we have compiled a set of benchmark programs into native executables and analysed them using two LLVM-based tools: DIVINE, a software model checker and KLEE, a symbolic execution engine. We have compared the outcomes to direct analysis of the same programs.
Related projects:

You are running an old browser version. We recommend updating your browser to its latest version.