{"id":7468,"date":"2025-11-13T13:38:52","date_gmt":"2025-11-13T21:38:52","guid":{"rendered":"https:\/\/objectsecurity.com\/?p=7468"},"modified":"2025-12-03T19:11:36","modified_gmt":"2025-12-04T03:11:36","slug":"symbolic-execution","status":"publish","type":"post","link":"https:\/\/objectsecurity.com\/symbolic-execution\/","title":{"rendered":"Symbolic Execution in ObjectSecurity\u2122 BinLens 3.3.0\u2122: How It Performs"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1872px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><p>ObjectSecurity\u2122 BinLens 3.3.0\u2122 is a powerful binary analysis platform built to dig deep into compiled executables and uncover vulnerabilities using advanced symbolic execution (SymbEx) technology. <span>It operates at the binary level using symbolic execution to detect flaws that source-level or SBOM-based tools overlook. The technology supports secure software assurance, red team workflows, and CI\/CD integration for defense and government programs. BinLens helps teams gain earlier visibility into inherited risks and supply chain exposure with a low false positive rate and minimal manual effort.<\/span><\/p>\n<p>BinLens 3.3.0 supports the analysis of x86-64, ARM64, MIPS-III, and several other architectures. In benchmarks of 108 binary files from Coreutils 9.5, function reachability\u2014the percentage of reachable functions analyzed at least once in a binary file\u2014performed as follows:<\/p>\n<ul>\n<li><u>x86-64<\/u>: Mean 33.9%, median 31.1% (range 16.8\u201358.2%)<\/li>\n<li><u>ARM64<\/u>: Mean 38.1%, median 37.8% (range 17.0\u201356.2%)<\/li>\n<li><u>MIPS-III<\/u>: Mean 31.5%, median 33.8% (range 5.4\u201356.6%)<\/li>\n<\/ul>\n<p><u>\u00a0<\/u><\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_3 1_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:5.76%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"text-align:center;--awb-caption-title-font-family:var(--body_typography-font-family);--awb-caption-title-font-weight:var(--body_typography-font-weight);--awb-caption-title-font-style:var(--body_typography-font-style);--awb-caption-title-size:var(--body_typography-font-size);--awb-caption-title-transform:var(--body_typography-text-transform);--awb-caption-title-line-height:var(--body_typography-line-height);--awb-caption-title-letter-spacing:var(--body_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><img data-recalc-dims=\"1\" decoding=\"async\" width=\"449\" height=\"333\" title=\"Screenshot 2025-11-13 141012\" src=\"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/11\/Screenshot-2025-11-13-141012-e1763068731341.png?resize=449%2C333&#038;ssl=1\" alt class=\"img-responsive wp-image-7469\" srcset=\"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/11\/Screenshot-2025-11-13-141012-e1763068731341.png?resize=66%2C49&amp;ssl=1 66w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/11\/Screenshot-2025-11-13-141012-e1763068731341.png?resize=177%2C131&amp;ssl=1 177w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/11\/Screenshot-2025-11-13-141012-e1763068731341.png?resize=200%2C148&amp;ssl=1 200w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/11\/Screenshot-2025-11-13-141012-e1763068731341.png?resize=300%2C222&amp;ssl=1 300w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/11\/Screenshot-2025-11-13-141012-e1763068731341.png?resize=320%2C237&amp;ssl=1 320w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/11\/Screenshot-2025-11-13-141012-e1763068731341.png?resize=400%2C297&amp;ssl=1 400w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/11\/Screenshot-2025-11-13-141012-e1763068731341.png?fit=449%2C333&amp;ssl=1 449w\" sizes=\"(max-width: 1075px) 100vw, (max-width: 640px) 100vw, 449px\" \/><\/span><\/div><div class=\"fusion-text fusion-text-2\" style=\"--awb-font-size:12px;\"><p style=\"text-align: center;\">Figure 1 &#8211; Distribution of Functions Reached Across 108 x86-64 Coreutils Binaries<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_3 1_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:5.76%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"text-align:center;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-2 hover-type-none\"><img data-recalc-dims=\"1\" decoding=\"async\" width=\"468\" height=\"357\" title=\"Screenshot 2025-11-13 141018\" src=\"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/11\/Screenshot-2025-11-13-141018-e1763069042244.png?resize=468%2C357&#038;ssl=1\" alt class=\"img-responsive wp-image-7470\" srcset=\"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/11\/Screenshot-2025-11-13-141018-e1763069042244.png?resize=66%2C50&amp;ssl=1 66w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/11\/Screenshot-2025-11-13-141018-e1763069042244.png?resize=177%2C135&amp;ssl=1 177w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/11\/Screenshot-2025-11-13-141018-e1763069042244.png?resize=200%2C153&amp;ssl=1 200w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/11\/Screenshot-2025-11-13-141018-e1763069042244.png?resize=300%2C229&amp;ssl=1 300w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/11\/Screenshot-2025-11-13-141018-e1763069042244.png?resize=320%2C244&amp;ssl=1 320w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/11\/Screenshot-2025-11-13-141018-e1763069042244.png?resize=400%2C305&amp;ssl=1 400w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/11\/Screenshot-2025-11-13-141018-e1763069042244.png?resize=460%2C351&amp;ssl=1 460w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/11\/Screenshot-2025-11-13-141018-e1763069042244.png?fit=468%2C357&amp;ssl=1 468w\" sizes=\"(max-width: 1075px) 100vw, (max-width: 640px) 100vw, 468px\" \/><\/span><\/div><div class=\"fusion-text fusion-text-3\" style=\"--awb-font-size:12px;\"><p style=\"text-align: center;\">Figure 2 &#8211; Distribution of Functions Reached Across 108 ARM64 Coreutils Binaries<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_3 1_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:5.76%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"text-align:center;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-3 hover-type-none\"><img data-recalc-dims=\"1\" decoding=\"async\" width=\"451\" height=\"341\" title=\"Screenshot 2025-11-13 141029\" src=\"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/11\/Screenshot-2025-11-13-141029-e1763069187600.png?resize=451%2C341&#038;ssl=1\" alt class=\"img-responsive wp-image-7471\" srcset=\"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/11\/Screenshot-2025-11-13-141029-e1763069187600.png?resize=66%2C50&amp;ssl=1 66w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/11\/Screenshot-2025-11-13-141029-e1763069187600.png?resize=177%2C134&amp;ssl=1 177w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/11\/Screenshot-2025-11-13-141029-e1763069187600.png?resize=200%2C151&amp;ssl=1 200w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/11\/Screenshot-2025-11-13-141029-e1763069187600.png?resize=300%2C227&amp;ssl=1 300w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/11\/Screenshot-2025-11-13-141029-e1763069187600.png?resize=320%2C242&amp;ssl=1 320w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/11\/Screenshot-2025-11-13-141029-e1763069187600.png?resize=400%2C302&amp;ssl=1 400w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/11\/Screenshot-2025-11-13-141029-e1763069187600.png?fit=451%2C341&amp;ssl=1 451w\" sizes=\"(max-width: 1075px) 100vw, (max-width: 640px) 100vw, 451px\" \/><\/span><\/div><div class=\"fusion-text fusion-text-4\" style=\"--awb-font-size:12px;\"><p style=\"text-align: center;\">Figure 3 &#8211; Distribution of Functions Reached Across 108 MIPS-III Coreutils Binaries<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-5\"><p>These results reflect solid multi-architecture support with predictable exploration depth. <span>To provide a uniform basis for comparison, every benchmark run was executed with a 6-hour time budget. BinLens demonstrates rapid early-phase exploration, reaching a substantial portion of the reachable functions it ultimately covers within the first two hours, and progressively deepening coverage over the full duration of the run.<\/span><\/p>\n<p>BinLens 3.3.0 delivers a capable and extensible foundation for symbolic execution across multiple architectures. With strong ELF binary coverage, growing performance insights, and ongoing improvements for embedded systems and multithreading, it\u2019s well positioned to support real-world vulnerability discovery workflows.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div style=\"text-align:center;\"><a class=\"fusion-button button-flat button-xlarge button-default fusion-button-default button-1 fusion-button-span-yes fusion-button-default-type\" target=\"_self\" href=\"http:\/\/objectsecurity.com\/binlens\"><span class=\"fusion-button-text\">BinLens &#8211; Binary Analysis<\/span><\/a><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div style=\"text-align:center;\"><a class=\"fusion-button button-flat button-xlarge button-default fusion-button-default button-2 fusion-button-span-yes fusion-button-default-type\" target=\"_self\" href=\"https:\/\/objectsecurity.com\/contact-us\/\"><span class=\"fusion-button-text\">Request a Demo<\/span><\/a><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":7,"featured_media":7480,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[63,101,90,70,87],"tags":[],"class_list":["post-7468","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-binlens","category-binlens-product-page","category-education","category-general","category-tech"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Symbolic Execution in ObjectSecurity\u2122 BinLens 3.3.0\u2122: How It Performs - ObjectSecurity<\/title>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/symbolic-execution\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/symbolic-execution\\\/\"},\"author\":{\"name\":\"Dan Mathews\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/#\\\/schema\\\/person\\\/14b868388b1a079ff39642a078cea62d\"},\"headline\":\"Symbolic Execution in ObjectSecurity\u2122 BinLens 3.3.0\u2122: How It Performs\",\"datePublished\":\"2025-11-13T21:38:52+00:00\",\"dateModified\":\"2025-12-04T03:11:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/symbolic-execution\\\/\"},\"wordCount\":5647,\"image\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/symbolic-execution\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/objectsecurity.com\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/symbex-how-it-preforms-FI.png?fit=600%2C337&ssl=1\",\"articleSection\":[\"BinLens\",\"BinLens Product Page\",\"Education\",\"General\",\"Technical\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/symbolic-execution\\\/\",\"url\":\"https:\\\/\\\/objectsecurity.com\\\/symbolic-execution\\\/\",\"name\":\"Symbolic Execution in ObjectSecurity\u2122 BinLens 3.3.0\u2122: How It Performs - ObjectSecurity\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/symbolic-execution\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/symbolic-execution\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/objectsecurity.com\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/symbex-how-it-preforms-FI.png?fit=600%2C337&ssl=1\",\"datePublished\":\"2025-11-13T21:38:52+00:00\",\"dateModified\":\"2025-12-04T03:11:36+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/#\\\/schema\\\/person\\\/14b868388b1a079ff39642a078cea62d\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/symbolic-execution\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/objectsecurity.com\\\/symbolic-execution\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/symbolic-execution\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/objectsecurity.com\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/symbex-how-it-preforms-FI.png?fit=600%2C337&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/objectsecurity.com\\\/wp-content\\\/uploads\\\/2025\\\/11\\\/symbex-how-it-preforms-FI.png?fit=600%2C337&ssl=1\",\"width\":600,\"height\":337},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/symbolic-execution\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/objectsecurity.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Symbolic Execution in ObjectSecurity\u2122 BinLens 3.3.0\u2122: How It Performs\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/#website\",\"url\":\"https:\\\/\\\/objectsecurity.com\\\/\",\"name\":\"ObjectSecurity\",\"description\":\"OT\\\/ICS Asset Binary Vulnerability Analysis and Reporting\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/objectsecurity.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/#\\\/schema\\\/person\\\/14b868388b1a079ff39642a078cea62d\",\"name\":\"Dan Mathews\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b06577e2636149f9ca4ada40c7d935744591ec4ec49be5865e3f0180e5d38b15?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b06577e2636149f9ca4ada40c7d935744591ec4ec49be5865e3f0180e5d38b15?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b06577e2636149f9ca4ada40c7d935744591ec4ec49be5865e3f0180e5d38b15?s=96&d=mm&r=g\",\"caption\":\"Dan Mathews\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Symbolic Execution in ObjectSecurity\u2122 BinLens 3.3.0\u2122: How It Performs - ObjectSecurity","robots":{"index":"noindex","follow":"follow"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/objectsecurity.com\/symbolic-execution\/#article","isPartOf":{"@id":"https:\/\/objectsecurity.com\/symbolic-execution\/"},"author":{"name":"Dan Mathews","@id":"https:\/\/objectsecurity.com\/#\/schema\/person\/14b868388b1a079ff39642a078cea62d"},"headline":"Symbolic Execution in ObjectSecurity\u2122 BinLens 3.3.0\u2122: How It Performs","datePublished":"2025-11-13T21:38:52+00:00","dateModified":"2025-12-04T03:11:36+00:00","mainEntityOfPage":{"@id":"https:\/\/objectsecurity.com\/symbolic-execution\/"},"wordCount":5647,"image":{"@id":"https:\/\/objectsecurity.com\/symbolic-execution\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/11\/symbex-how-it-preforms-FI.png?fit=600%2C337&ssl=1","articleSection":["BinLens","BinLens Product Page","Education","General","Technical"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/objectsecurity.com\/symbolic-execution\/","url":"https:\/\/objectsecurity.com\/symbolic-execution\/","name":"Symbolic Execution in ObjectSecurity\u2122 BinLens 3.3.0\u2122: How It Performs - ObjectSecurity","isPartOf":{"@id":"https:\/\/objectsecurity.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/objectsecurity.com\/symbolic-execution\/#primaryimage"},"image":{"@id":"https:\/\/objectsecurity.com\/symbolic-execution\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/11\/symbex-how-it-preforms-FI.png?fit=600%2C337&ssl=1","datePublished":"2025-11-13T21:38:52+00:00","dateModified":"2025-12-04T03:11:36+00:00","author":{"@id":"https:\/\/objectsecurity.com\/#\/schema\/person\/14b868388b1a079ff39642a078cea62d"},"breadcrumb":{"@id":"https:\/\/objectsecurity.com\/symbolic-execution\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/objectsecurity.com\/symbolic-execution\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/objectsecurity.com\/symbolic-execution\/#primaryimage","url":"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/11\/symbex-how-it-preforms-FI.png?fit=600%2C337&ssl=1","contentUrl":"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/11\/symbex-how-it-preforms-FI.png?fit=600%2C337&ssl=1","width":600,"height":337},{"@type":"BreadcrumbList","@id":"https:\/\/objectsecurity.com\/symbolic-execution\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/objectsecurity.com\/"},{"@type":"ListItem","position":2,"name":"Symbolic Execution in ObjectSecurity\u2122 BinLens 3.3.0\u2122: How It Performs"}]},{"@type":"WebSite","@id":"https:\/\/objectsecurity.com\/#website","url":"https:\/\/objectsecurity.com\/","name":"ObjectSecurity","description":"OT\/ICS Asset Binary Vulnerability Analysis and Reporting","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/objectsecurity.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/objectsecurity.com\/#\/schema\/person\/14b868388b1a079ff39642a078cea62d","name":"Dan Mathews","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/b06577e2636149f9ca4ada40c7d935744591ec4ec49be5865e3f0180e5d38b15?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b06577e2636149f9ca4ada40c7d935744591ec4ec49be5865e3f0180e5d38b15?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b06577e2636149f9ca4ada40c7d935744591ec4ec49be5865e3f0180e5d38b15?s=96&d=mm&r=g","caption":"Dan Mathews"}}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/11\/symbex-how-it-preforms-FI.png?fit=600%2C337&ssl=1","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/posts\/7468","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/comments?post=7468"}],"version-history":[{"count":10,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/posts\/7468\/revisions"}],"predecessor-version":[{"id":7600,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/posts\/7468\/revisions\/7600"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/media\/7480"}],"wp:attachment":[{"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/media?parent=7468"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/categories?post=7468"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/tags?post=7468"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}