Symbolic Execution ================== We talk about the use of symbolic execution to reach potential problematic points in a program. Slides for this session: * handout_ * handout_4on1_notes_ * handout_8on1_ .. _handout: http://elf.cs.pub.ro/sis/res/11-symexec-handout.pdf .. _handout_4on1_notes: http://elf.cs.pub.ro/sis/res/11-symexec-handout-4on1-notes.pdf .. _handout_8on1: http://elf.cs.pub.ro/sis/res/11-symexec-handout-8on1.pdf Tasks ----- For this session we will use the excellent resources provided by the `MIT 6.858: Computer Systems Security`_ class. 1. First setup the virtual machine for the class. Go to the `6.858 Lab 1`_ page, the ``Lab infrastructure`` section and see instructions on setting up the virtual machine. You can download the virtual machine either directly from the `MIT VM download link`_ or from our `local mirror`_. 2. The access the `6.858 Lab 3`_. Go through the content sequentially. Aim to do as many exercises (and challenges) as possible. .. _`MIT 6.858: Computer Systems Security`: https://css.csail.mit.edu/6.858/2022/ .. _`6.858 Lab 1`: https://css.csail.mit.edu/6.858/2020/labs/lab1.html .. _`6.858 Lab 3`: https://css.csail.mit.edu/6.858/2020/labs/lab3.html .. _`MIT VM download link`: https://web.mit.edu/6.858/2020/6.858-x86_64-v20.zip .. _`local mirror`: http://titan.cs.pub.ro/~razvan/store/sis/