By researching the previous binary mining method, a new mining model based on fuzzing, reversing and symbolic execution technology was presented. This method used reversing analysis to locate integer vulnerabilities scope, obtain related data types by IDA disassembler and SDK development kit, detect safety sensitive functions, build function control diagram, determine the related codes of potential integer vulnerabilities, and cover each code part related. The input and output relations were obtained by symbolic execution in assembly codes and adjusting the input for fuzzing. The proposed model greatly enhances the binary integer vulnerabilities mining accuracy and efficiency.