Exposing Go's Hidden Bugs: A Novel Concolic Framework
By: Karolina Gorna , Nicolas Iooss , Yannick Seurin and more
Potential Business Impact:
Finds hidden bugs in computer code.
The widespread adoption of the Go programming language in infrastructure backends and blockchain projects has heightened the need for improved security measures. Established techniques such as unit testing, static analysis, and program fuzzing provide foundational protection mechanisms. Although symbolic execution tools have made significant contributions, opportunities remain to address the complexities of Go's runtime and concurrency model. In this work, we present Zorya, a novel methodology leveraging concrete and symbolic (concolic) execution to evaluate Go programs comprehensively. By systematically exploring execution paths to uncover vulnerabilities beyond conventional testing, symbolic execution offers distinct advantages, and coupling it with concrete execution mitigates the path explosion problem. Our solution employs Ghidra's P-Code as an intermediate representation (IR). This implementation detects runtime panics in the TinyGo compiler and supports both generic and custom invariants. Furthermore, P-Code's generic IR nature enables analysis of programs written in other languages such as C. Future enhancements may include intelligent classification of concolic execution logs to identify vulnerability patterns.
Similar Papers
Zorya: Automated Concolic Execution of Single-Threaded Go Binaries
Software Engineering
Finds hidden bugs in computer programs faster.
ColorGo: Directed Concolic Execution
Cryptography and Security
Finds computer bugs faster and better.
Validating Solidity Code Defects using Symbolic and Concrete Execution powered by Large Language Models
Software Engineering
Finds bugs in online money code.