Vulnerability Discovery Techniques By Binary Analysis

Get Started. It's Free
or sign up with your email address
Rocket clouds
Vulnerability Discovery Techniques By Binary Analysis by Mind Map: Vulnerability Discovery Techniques By Binary Analysis

1. Static Analysis, without executing the binary

1.1. Flow Modeling (Call Flow Graph [CFG]):

1.1.1. Iterative CFG Recovery

1.1.2. Forced Execution

1.1.3. Static Symbolic Execution

1.1.4. Backward Slicing

1.2. Data Modeling (Value Set Analysis)

2. Dynamic Analysis, which executes the binary

2.1. Concrete Execution

2.1.1. Fuzzing

2.1.2. Coverage-based Fuzzing:

2.1.3. Taint-based Fuzzing

2.2. Dynamic Symbolic Execution (DSE)

2.2.1. Classical DSE

2.2.2. Symbolic-assisted Fuzzing

2.2.3. Under-constraint DSE