Repository logo

Infoscience

  • English
  • French
Log In
Logo EPFL, École polytechnique fédérale de Lausanne

Infoscience

  • English
  • French
Log In
  1. Home
  2. Academic and Research Output
  3. Journal articles
  4. The S2E Platform: Design, Implementation, and Applications
 
research article

The S2E Platform: Design, Implementation, and Applications

Chipounov, Vitaly  
•
Kuznetsov, Volodymyr  
•
Candea, George  
2012
ACM Transactions on Computer Systems

This article presents S2E, a platform for analyzing the properties and behavior of software systems, along with its use in developing tools for comprehensive performance profiling, reverse engineering of proprietary software, and automated testing of kernel-mode and user-mode binaries. Conceptually, S2E is an automated path explorer with modular path analyzers: the explorer uses a symbolic execution engine to drive the target system down all execution paths of interest, while analyzers measure and/or check properties of each such path. S2E users can either combine existing analyzers to build custom analysis tools, or they can directly use S2E’s APIs. S2E’s strength is the ability to scale to large systems, such as a full Windows stack, using two new ideas: selective symbolic execution, a way to automatically minimize the amount of code that has to be executed symbolically given a target analysis, and execution consistency models, a way to make principled performance/accuracy trade-offs during analysis. These techniques give S2E three key abilities: to simultaneously analyze entire families of execution paths instead of just one execution at a time; to perform the analyses in-vivo within a real software stack—user programs, libraries, kernel, drivers, etc.—instead of using abstract models of these layers; and to operate directly on binaries, thus being able to analyze even proprietary software.

  • Details
  • Metrics
Type
research article
DOI
10.1145/2110356.2110358
Web of Science ID

WOS:000301046300002

Author(s)
Chipounov, Vitaly  
Kuznetsov, Volodymyr  
Candea, George  
Date Issued

2012

Published in
ACM Transactions on Computer Systems
Volume

30

Issue

1

Start page

2

Subjects

Symbolic execution

•

In-vivo

•

Execution consistency models

•

Testing

•

Analysis

•

Profiling

•

Reverse Engineering

•

Device Driver Testing

Editorial or Peer reviewed

REVIEWED

Written at

EPFL

EPFL units
DSLAB  
Available on Infoscience
March 7, 2012
Use this identifier to reference this record
https://infoscience.epfl.ch/handle/20.500.14299/78478
Logo EPFL, École polytechnique fédérale de Lausanne
  • Contact
  • infoscience@epfl.ch

  • Follow us on Facebook
  • Follow us on Instagram
  • Follow us on LinkedIn
  • Follow us on X
  • Follow us on Youtube
AccessibilityLegal noticePrivacy policyCookie settingsEnd User AgreementGet helpFeedback

Infoscience is a service managed and provided by the Library and IT Services of EPFL. © EPFL, tous droits réservés