Journal of University of Science and Technology of China ›› 2016, Vol. 46 ›› Issue (1): 21-27.DOI: 10.3969/j.issn.0253-2778.2016.01.004

• Original Paper • Previous Articles    

A research on control-flow taint information directed symbolic execution

HUANG Hui, LU Yuliang, LIU Lintao, ZHAO Jun   

  1. Electronic Engineering Institution of PLA,AnHui 230037, China
  • Received:2015-03-29 Revised:2015-04-22 Accepted:2015-04-22 Online:2015-04-22 Published:2015-04-22

Abstract: Aiming at generation of test cases covering the potential vulnerable program points and combining generation base Fuzzing, static control flow analysis and static taint analysis, this paper proposes a directed dynamic symbolic execution method. By Fuzzing the test cases which could reach the function containing the vulnerable program points are generated, leading the symbolic execution fast towards the vulnerable functions along the denoted single path; By making a static control-flow analysis and a static taint analyses in the vulnerable functions, the control flow taint eachable slices are calculated directing the multi-path dynamic symbolic execution towards the desired vulnerable program points. Experiments prove effectiveness of the method in mitigating the path explosion problem common in symbolic execution applications and in generating test cases that trigger target vulnerability.

Key words: control flow analysis, taint analysis, directed symbolic execution

CLC Number: