Analysing "Trigger-based" Malware with S2E
2018-09-02 | #malware analysis #s2e #symbolic execution
Introduction This blog post is a quick brain-dump of the work that I was doing during my last month in the Dependable Systems Lab at EPFL. At the time I was working on malware analysis with S2E. While not anything earth-shatteringly novel, I’m hopeful that this post will help others who want to use symbolic execution/S2E to analyse malware behaviour. What makes malware analysis different? My previous blog posts have looked at solving a CTF challenge and analysing file parsers.