Back to Search Start Over

SENinja: A symbolic execution plugin for Binary Ninja

Authors :
Luca Borzacchiello
Emilio Coppa
Camil Demetrescu
Source :
SoftwareX, Vol 20, Iss , Pp 101219- (2022)
Publication Year :
2022
Publisher :
Elsevier, 2022.

Abstract

Symbolic execution is a program analysis technique that aims to automatically identify interesting inputs for an application, using them to generate program executions covering different parts of the code. It is widely used in the context of vulnerability discovery and reverse engineering. In this paper we present SENinja, a symbolic execution plugin for the BinaryNinja disassembler. The tool allows the user to perform symbolic execution analyses directly within the user interface of the disassembler, and can be used to support a variety of reverse engineering tasks.

Details

Language :
English
ISSN :
23527110
Volume :
20
Issue :
101219-
Database :
Directory of Open Access Journals
Journal :
SoftwareX
Publication Type :
Academic Journal
Accession number :
edsdoj.043ef57d68cd42f4971d615f6d06f7dc
Document Type :
article
Full Text :
https://doi.org/10.1016/j.softx.2022.101219