当前位置:网站首页>Quick tutorial of reverse tool angr (2): symbol execution

Quick tutorial of reverse tool angr (2): symbol execution

2020-12-07 14:26:19 osc_ eh3g3bni

The book follows 1, Suppose you already know about angr Some basic knowledge ( for example , Installation method 、 How to import a project , And getting the program CFG etc. ), This article will mainly discuss how to use angr The program is based on Symbolic Execution Analysis of . The program used in this article is angr Official documents 2 One of the most basic examples given in , It's very suitable for introductory teaching .

In previous articles , We mentioned that “angr It's based on Python The development of binary analysis programs (Binary analysis) frame , Can be used to carry out dynamic symbolic execution (Symbolic Execution) And a variety of static analyses ”. in fact ,Symbolic Execution That's exactly what it is. angr A representative function of .

Symbol execution Symbolic Execution):In computer science, symbolic execution is a means of analyzing a program to determine what inputs cause each part of a program to execute.

版权声明
本文为[osc_ eh3g3bni]所创,转载请带上原文链接,感谢
https://chowdera.com/2020/12/202012071425357016.html