Abstract:
We describe a dynamic analysis technique for discovering vulnerabilities where we, first, analyse isolated components of a program for vulnerabilities with three modes – symbolic execution, fuzzing and a novel greybox fuzzing method. To determine the feasibility of vulnerabilities, we propose a compositional analysis method using targeted symbolic execution. Finally, we discuss an adaptable assessment method based on heuristics from bug-repository- and code-mining, to assist in bug triage.