Tag: symbolic execution

6 articles
Date Wed 17 May 2023
Authors Robin David, Christian Heitman
Category Fuzzing

In this blog post we present PASTIS, a Python framework for ensemble fuzzing, developed at Quarkslab.

Date Tue 02 May 2023
Authors Robin David, Christian Heitman
Category Program Analysis

We present TritonDSE, a new tool by Quarkslab. TritonDSE is a Python library, built on top of Triton, that provides easy and customizable Dynamic Symbolic Execution capabilities for binary programs.

Date Thu 25 June 2020
Authors Christian Heitman, Jonathan Salwan
Category Program Analysis

This blog post is a follow-up on the announcement of Triton v0.8, where we explain how we added support for ARMv7 and provide a guideline for adding new architectures.

Date Mon 12 September 2016
Author Adrien Guinet
Category Software

Obfuscation is made of many different tricks. One we meet very often is mixed instructions who make computations mixing usual arithmetic (ADD, SUB, MUL, DIV) and boolean one (XOR, AND, NOT, OR). All tools get lost when it comes to cleaning this kind of very messy blocks of instructions, and that is why we designed Arybo. With Arybo, analyzing such expressions become way more easy.

Date Thu 04 December 2014
Author Francis Gabriel
Category Reverse-Engineering

We recently looked at the Obfuscator-LLVM project in order to test its different protections. Here are our results, and explanations on how we deal with obfuscation.