S3SS10N Wednesday – Symbolic Execution

Join Cybrary

Begin Learning Cyber Security for FREE Now!

Already a Member Login Here
< Back to S3SS10NS

S3SS10N Wednesday – Symbolic Execution

Published: October 12, 2016 | By: John Foster | Views: 3122
This post has been saved to your profile

This Weeks S3SS10N Wednesday

This session covers symbolic execution and adds to information covered in a previous session covering P-trace. Symbolic execution is the method of processing a binary in order to discover what the normal would look like. Symbolic execution is expensive from a computing standpoint. The computer discovers a branch of execution and then offers a solution for what it used. Participants learn how to set arguments to set up a symbolic execution via giving the right input.

Whiteboard Notes

Click Image to View a Larger Version
< Back to S3SS10NS

About This S3SS10N Wednesday's Contributor

John Foster
John Foster is a security researcher and do-er of things for Point3 Security. . He has a degree in Information Systems from Shippensburg University and an MBA from Texas A&M - Commerce. He worked previously at the United States Navy and the Pentagon, doing cyber-y things. He currently teaches cyber operations and reverse engineering for the DoD.
Enjoy this S3SS10N Wednesday? Want more Cybytes?
Invite a Friend
and share now
Facebook Twitter LinkedIn Email
Join Cybrary
1 Comment
Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge


We recommend always using caution when following any link

Are you sure you want to continue?