Program Analysis – S3lab http://s3lab.deusto.es S3lab Security Blog Wed, 06 May 2020 12:51:35 +0000 en-US hourly 1 https://wordpress.org/?v=5.1.5 Dynamic binary instrumentation http://s3lab.deusto.es/dynamic-binary-instrumentation/ Fri, 06 Jul 2018 12:53:23 +0000 http://s3lab.deusto.es/?p=9969 In the previous post we talked about the possibilities to implement programs and carry out all kinds of tasks such as profiling or vulnerability detection. We also introduced Intel Pin, a dynamic binary instrumentation tool (mainly for IA32 and x86_64),

The post Dynamic binary instrumentation appeared first on S3lab.

]]>
In the previous post we talked about the possibilities to implement programs and carry out all kinds of tasks such as profiling or vulnerability detection. We also introduced Intel Pin, a dynamic binary instrumentation tool (mainly for IA32 and x86_64), which we are going to talk about in this installment. Like a debugger, Pin can launch an application or can be set to a running process, intrument it as necessary, collect the information of interest and separate at any time so that it can continue with its normal execution. To have control over the instrumented process uses calls to ptrace () (in Linux) that we saw in a previous post. The general architecture of Intel Pin is shown in the figure but for more detail I recommend reading the original article.

The post Dynamic binary instrumentation appeared first on S3lab.

]]>
Program instrumentation options http://s3lab.deusto.es/program-instrumentation-options/ Mon, 14 May 2018 13:00:52 +0000 http://s3lab.deusto.es/?p=9882 Many of the methods of software testing and dynamic analysis of programs (not necessarily related to security) require inserting some additional instructions in the text of the program to obtain added information, that is, to instrument the program. For example,

The post Program instrumentation options appeared first on S3lab.

]]>
Many of the methods of software testing and dynamic analysis of programs (not necessarily related to security) require inserting some additional instructions in the text of the program to obtain added information, that is, to instrument the program. For example, one of the options when measuring the performance of an application is to add statements to read the clock at the beginning and end of each function so that you can calculate the time it takes to run each and then optimize the that take longer than necessary.

The post Program instrumentation options appeared first on S3lab.

]]>
The idea behind the symbolic execution http://s3lab.deusto.es/idea-symbolic-execution/ Tue, 07 Nov 2017 09:31:09 +0000 http://s3lab.deusto.es/?p=9554 Following in the line of program analysis techniques, this time we are going to talk about a technique that is somewhere in between static techniques and dynamics, symbolic execution. It is a type of analysis that covers different limitations of

The post The idea behind the symbolic execution appeared first on S3lab.

]]>
Following in the line of program analysis techniques, this time we are going to talk about a technique that is somewhere in between static techniques and dynamics, symbolic execution. It is a type of analysis that covers different limitations of static and dynamic analysis and provides a solution to address the limited semantic view of fuzzing, which is why it is used by a huge number of security applications, such as vulnerability detection. , malware analysis or generation of test cases.

The post The idea behind the symbolic execution appeared first on S3lab.

]]>