Symbolic Execution

We talk about the use of symbolic execution to reach potential problematic points in a program.

Slides for this session:


For this session we will use the excellent resources provided by the MIT 6.858: Computer Systems Security class.

  1. First setup the virtual machine for the class. Go to the 6.858 Lab 1 page, the Lab infrastructure section and see instructions on setting up the virtual machine.

    You can download the virtual machine either directly from the MIT VM download link or from our local mirror.

  2. The access the 6.858 Lab 3. Go through the content sequentially. Aim to do as many exercises (and challenges) as possible.