now i'm thinking about integrating symbolic execution into an interactive disassembler. add assumptions about arguments in form of expressions, and get back impossible paths or likely return values. did anyone do this before? if not, why?
-
-
Odgovor korisniku/ci @whitequark
To answer "if not why?", my guess is few teams combine the skills to do debugger UX, symbolic execution, and follow up support/product iteration. Also much harder to measure than # CVEs. Which is to say if it's useful to you, try it!
1 reply 0 proslijeđenih tweetova 3 korisnika označavaju da im se sviđa
Odgovor korisnicima @dmolnar @whitequark
Not sure if you saw this yet there is also an interesting study of RE practices coming up at usenix security that may give ideas on what else would be helpful http://users.umiacs.umd.edu/~dvotipka/papers/VotipkaREStudy2020.pdf …
13:14 - 4. sij 2020.
0 replies
10 proslijeđenih tweetova
29 korisnika označava da im se sviđa
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.