Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
Abstract. Map2Check is a bug hunting tool that automatically checks safety properties in C programs. It tracks memory pointers and variable assignments.
Map2Check exploits dynamic information flow by tainting program data. ✓ It uses Clang/LLVM as an industrial-strength compiler to simplify.
Here, we extend Map2Check to: (i) simplify the program using Clang/LLVM; (ii) perform a path-based symbolic execution using the KLEE tool; and (iii) transform ...
Here, we extend Map2Check to: (i) simplify the program using Clang/LLVM; (ii) perform a path-based symbolic execution using the KLEE tool; and (iii) transform ...
Here, we extend Map2Check to: (i) simplify the program using Clang/LLVM; (ii) perform a path-based symbolic execution using the KLEE tool; and (iii) transform ...
Map2Check is a software verification tool that combines fuzzing, symbolic execution, and inductive invariants. It automatically checks safety properties in ...
Fingerprint. Dive into the research topics of 'Map2Check using LLVM and KLEE: (Competition contribution)'. Together they form a unique fingerprint.
FuSeBMC: A White-Box Fuzzer for Finding Security Vulnerabilities in C Programs (Competition Contribution). Kaled M. Alshmrany, Rafael S. Menezes, Mikhail R ...
Below you can find a list of 250+ papers and systems that either use or extend KLEE. They are listed in chronological order.
Map2Check is a software verification tool that combines fuzzing, symbolic execution, and inductive invariants. It automatically checks safety properties in ...