SEMA: ToolChain using Symbolic Execution for Malware Analysis
SEMA – ToolChain using Symbolic Execution for Malware Analysis SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create representative signatures based...
The post SEMA: ToolChain using Symbolic Execution for Malware Analysis appeared first on Penetration Testing Tools.