Thesis Topic Details

Topic ID:
3547
Title:
Symbolic execution for detecting system bugs on binary code
Supervisor:
Yulei Sui
Research Area:
Program Analysis, Compiler
Associated Staff
Assessor:
Jingling Xue
Topic Details
Status:
Active
Type:
R & D
Programs:
CS CE BIOM BINF SE
Group Suitable:
No
Industrial:
No
Pre-requisites:
Some understanding about reverse engineering and good software development skills with large systems
Description:
Binary analysis is powerful for detecting bugs and security
vulnerabilities for programs whose source code is not available.
However, due to the lack of source-code information, binaries
are challenging to analyse. Symbolic execution, as a promising approach
for software testing, is a program analysis technique that executes
a program with symbolic rather than concrete inputs. Symbolic execution
can be used to detect software bugs by automatically generating
test cases to replay those errors. Some existing tools include
KLEE, CUTE and PathFinder.

This project aims to develop new symbolic execution techniques
for detecting system errors in binary code based on some
existing open-source tools such as BitBlaze (available at
http://bitblaze.cs.berkeley.edu).
Comments:
If you want to discuss the topic, send me an email and we can make an appointment.
Past Student Reports
 
No Reports Available. Contact the supervisor for more information.

Check out all available reports in the CSE Thesis Report Library.

NOTE: only current CSE students can login to view and select reports to download.