KRover: A symbolic execution engine for dynamic kernel analysis

We present KRover, a novel kernel symbolic execution engine catered for dynamic kernel analysis such as vulnerability analysis and exploit generation. Different from existing symbolic execution engines, KRover operates directly upon a live kernel thread's virtual memory and weaves symbolic exec...

Full description

Saved in:
Bibliographic Details
Main Authors: PITIGALA ARACHCHILLAGE, Pansilu Madhura Bhashana Pitigalaarachchi, DING, Xuhua, QIU, Haiqing, TU, Haoxin, HONG, Jiaqi, JIANG, Lingxiao
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2023
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/8469
https://ink.library.smu.edu.sg/context/sis_research/article/9472/viewcontent/3576915.3623198.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-9472
record_format dspace
spelling sg-smu-ink.sis_research-94722024-01-11T07:30:07Z KRover: A symbolic execution engine for dynamic kernel analysis PITIGALA ARACHCHILLAGE, Pansilu Madhura Bhashana Pitigalaarachchi DING, Xuhua QIU, Haiqing TU, Haoxin HONG, Jiaqi JIANG, Lingxiao We present KRover, a novel kernel symbolic execution engine catered for dynamic kernel analysis such as vulnerability analysis and exploit generation. Different from existing symbolic execution engines, KRover operates directly upon a live kernel thread's virtual memory and weaves symbolic execution into the target's native executions. KRover is compact as it neither lifts the target binary to an intermediary representation nor uses QEMU or dynamic binary translation. Benchmarked against S2E, our performance experiments show that KRover is up to 50 times faster but with one tenth to one quarter of S2E memory cost. As shown in our four case studies, KRover is noise free, has the best-possible binary intimacy and does not require prior kernel instrumentation. Moreover, a user can develop her kernel analyzer that not only uses KRover as a symbolic execution library but also preserves its independent capabilities of reading/writing/controlling the target runtime. Namely, the resulting analyzer on top of KRover integrates symbolic reasoning and conventional dynamic analysis and reaps the benefits of their reinforcement to each other. 2023-11-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/8469 info:doi/10.1145/3576915.3623198 https://ink.library.smu.edu.sg/context/sis_research/article/9472/viewcontent/3576915.3623198.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University dynamic kernel analysis symbolic execution Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic dynamic kernel analysis
symbolic execution
Information Security
spellingShingle dynamic kernel analysis
symbolic execution
Information Security
PITIGALA ARACHCHILLAGE, Pansilu Madhura Bhashana Pitigalaarachchi
DING, Xuhua
QIU, Haiqing
TU, Haoxin
HONG, Jiaqi
JIANG, Lingxiao
KRover: A symbolic execution engine for dynamic kernel analysis
description We present KRover, a novel kernel symbolic execution engine catered for dynamic kernel analysis such as vulnerability analysis and exploit generation. Different from existing symbolic execution engines, KRover operates directly upon a live kernel thread's virtual memory and weaves symbolic execution into the target's native executions. KRover is compact as it neither lifts the target binary to an intermediary representation nor uses QEMU or dynamic binary translation. Benchmarked against S2E, our performance experiments show that KRover is up to 50 times faster but with one tenth to one quarter of S2E memory cost. As shown in our four case studies, KRover is noise free, has the best-possible binary intimacy and does not require prior kernel instrumentation. Moreover, a user can develop her kernel analyzer that not only uses KRover as a symbolic execution library but also preserves its independent capabilities of reading/writing/controlling the target runtime. Namely, the resulting analyzer on top of KRover integrates symbolic reasoning and conventional dynamic analysis and reaps the benefits of their reinforcement to each other.
format text
author PITIGALA ARACHCHILLAGE, Pansilu Madhura Bhashana Pitigalaarachchi
DING, Xuhua
QIU, Haiqing
TU, Haoxin
HONG, Jiaqi
JIANG, Lingxiao
author_facet PITIGALA ARACHCHILLAGE, Pansilu Madhura Bhashana Pitigalaarachchi
DING, Xuhua
QIU, Haiqing
TU, Haoxin
HONG, Jiaqi
JIANG, Lingxiao
author_sort PITIGALA ARACHCHILLAGE, Pansilu Madhura Bhashana Pitigalaarachchi
title KRover: A symbolic execution engine for dynamic kernel analysis
title_short KRover: A symbolic execution engine for dynamic kernel analysis
title_full KRover: A symbolic execution engine for dynamic kernel analysis
title_fullStr KRover: A symbolic execution engine for dynamic kernel analysis
title_full_unstemmed KRover: A symbolic execution engine for dynamic kernel analysis
title_sort krover: a symbolic execution engine for dynamic kernel analysis
publisher Institutional Knowledge at Singapore Management University
publishDate 2023
url https://ink.library.smu.edu.sg/sis_research/8469
https://ink.library.smu.edu.sg/context/sis_research/article/9472/viewcontent/3576915.3623198.pdf
_version_ 1789483242674454528