Symbolic Execution in Practice: A Survey of Applications in Vulnerability, Malware, Firmware, and Protocol Analysis

dc.contributor.authorBailey, Joshua
dc.contributor.authorNicholas, Charles
dc.date.accessioned2025-09-18T14:22:16Z
dc.date.issued2025-08-12
dc.description.abstractSymbolic execution is a powerful program analysis technique that allows for the systematic exploration of all program paths. Path explosion, where the number of states to track becomes unwieldy, is one of the biggest challenges hindering symbolic execution's practical application. To combat this, researchers have employed various strategies to enable symbolic execution on complex software systems. This paper introduces a systematic taxonomy of these strategies, categorizing them into two primary approaches: Scope Reduction, which aims to reduce the scope of symbolic execution to manageable portions of code, and Guidance Heuristics, which steer the symbolic execution engine toward promising paths. Using this taxonomy as a lens, we survey applications of symbolic executions in several domains such as vulnerability analysis, malware analysis, firmware re-hosting, and network protocol analysis. Finally, we identify promising directions for future research, including the application of symbolic execution to real-time operating systems and modern, type-safe languages.
dc.description.urihttp://arxiv.org/abs/2508.06643
dc.format.extent47 pages
dc.genrejournal articles
dc.genrepreprints
dc.identifierdoi:10.13016/m2dh6l-chal
dc.identifier.urihttps://doi.org/10.48550/arXiv.2508.06643
dc.identifier.urihttp://hdl.handle.net/11603/40217
dc.language.isoen
dc.relation.isAvailableAtThe University of Maryland, Baltimore County (UMBC)
dc.relation.ispartofUMBC Computer Science and Electrical Engineering Department
dc.relation.ispartofUMBC Faculty Collection
dc.relation.ispartofUMBC Student Collection
dc.rightsThis item is likely protected under Title 17 of the U.S. Copyright Law. Unless on a Creative Commons license, for uses protected by Copyright Law, contact the copyright holder or the author.
dc.subjectComputer Science - Cryptography and Security
dc.titleSymbolic Execution in Practice: A Survey of Applications in Vulnerability, Malware, Firmware, and Protocol Analysis
dc.typeText
dcterms.creatorhttps://orcid.org/0009-0008-9353-594X
dcterms.creatorhttps://orcid.org/0000-0001-9494-7139

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
2508.06643v1.pdf
Size:
542.83 KB
Format:
Adobe Portable Document Format