[HN Gopher] KLEE Symbolic Execution Engine
___________________________________________________________________
KLEE Symbolic Execution Engine
Author : nateb2022
Score : 27 points
Date : 2024-08-27 19:43 UTC (3 hours ago)
(HTM) web link (github.com)
(TXT) w3m dump (github.com)
| MaxBarraclough wrote:
| The project's webpage is a more helpful starting point than the
| repository: https://klee-se.org/
| anonymousDan wrote:
| Is anyone actually using symbolic execution in industry these
| days? I personally like it but I feel like fuzzing has completely
| taken over in terms of academic research at least.
| topazas wrote:
| I would like to - but unable to find any libraries / engines
| that would function in a some sort of 'mocked' environment. for
| example - i need to cover all execution paths for only single
| function with high cyclomatic complexity, given all other stuff
| is mocked. Maybe it would be called unit test mix with se. also
| for dynamic languages such as php/python/ruby.
| drdrey wrote:
| does Kani count?
|
| https://github.com/model-checking/kani
| nekitamo wrote:
| I've been using Triton a lot lately to make sense of heavily
| obfuscated code. The ability to translate a symbolic "trace"
| into an LLVM bitcode listing is super useful. You can do a lot
| of optimizations from there easily to recover the original
| code:
|
| https://github.com/JonathanSalwan/Triton/wiki
| __alexander wrote:
| Your deobfuscating process would make a good blog post :)
___________________________________________________________________
(page generated 2024-08-27 23:00 UTC)