This is a binary ninja plugin that implements a symbolic execution engine based only on z3, highly inspired by the angr framework (https://angr.io/). The plugin is implemented as an emulator of LLIL instructions that builds and manipulates z3 formulas.
SENinja simulates a debugger: the execution is path driven, only one state is active and executes instructions. The other states, generated at branches, are saved in a deferred queue. At any time, the active state can be changed with a deferred one.
The plugin adds the following commands:
More APIs can be executed through the python shell. For example, we can use the solver to prove a condition for the current state:
>>> import borzacchiello_seninja as seninja
>>> s = seninja.get_current_state()
>>> s.solver.satisfiable(extra_constraints=[s.regs.eax == 3])
the code will check the satisfiablity of eax == 3
given the path constraint of the active state.
Consult the wiki to have more info about the commands.
SENinja gives to the user the possibility to configure many parts of the symbolic engine (e.g. dimension of pages, symbolic memory access strategy, etc.).
All the available settings can be accessed and modified by clicking on Edit/Preferences/Settings
and selecting SENinja
in the left widget.
SENinja comes with two widgets that can be used to visualize the registers and a portion of memory of the active state. The widgets can be activated by clicking on View/Show SENinja *
.
This widget allows the creation of buffers containing symbolic data.
The Register View can be used to visualize the value of the registers of the active state. The value of a register can be modifyied by double-clicking on it. The right-click menu allows to:
- Copy the content of the register
- Concretize the value of the register
- Evaluate the value of the register using the solver
- Inject symbols
- Show the register expression
- Set the register to the address of a buffer created with the buffer view
The Memory View can be used to visualize the value of a portion of memory of the active state. By clicking on "monitor memory", the user can specify a memory address to monitor. The widget will show 512 bytes starting from that address.
The memory view is splitted in two sections: an hexview and an ascii view. The hexview shows the hex value of each byte only if the byte is mapped and concrete. If the byte is unmapped, the characted _
is shown; if the byte is symbolic, the widget shows the character .
.
Double-clicking on a byte allows the user to modify its value in the active state. The right-click menu allows to:
- Copy the selection (in various format, e.g. little-endian, binary, etc.)
- Concretize the value of the selection
- Evaluate the value of the selection using the solver
- Inject symbols
Tested with
- binary ninja
3.0
with personal license - python
3.9.7
- z3
4.8.14
To make it work, you need to install z3 with pip:
$ pip3 install z3-solver