|
@dmolnar | |||||
|
Not sure if you saw this yet there is also an interesting study of RE practices coming up at usenix security that may give ideas on what else would be helpful users.umiacs.umd.edu/~dvotipka/pape…
|
||||||
|
||||||
|
whitequark
@whitequark
|
4. sij |
|
now i'm thinking about integrating symbolic execution into an interactive disassembler. add assumptions about arguments in form of expressions, and get back impossible paths or likely return values.
did anyone do this before? if not, why?
|
||
|
|
||
|
dmolnar
@dmolnar
|
4. sij |
|
To answer "if not why?", my guess is few teams combine the skills to do debugger UX, symbolic execution, and follow up support/product iteration. Also much harder to measure than # CVEs. Which is to say if it's useful to you, try it!
|
||
|
|
||