[HN Gopher] KLEE Symbolic Execution Engine
       ___________________________________________________________________
        
       KLEE Symbolic Execution Engine
        
       Author : nateb2022
       Score  : 27 points
       Date   : 2024-08-27 19:43 UTC (3 hours ago)
        
 (HTM) web link (github.com)
 (TXT) w3m dump (github.com)
        
       | MaxBarraclough wrote:
       | The project's webpage is a more helpful starting point than the
       | repository: https://klee-se.org/
        
       | anonymousDan wrote:
       | Is anyone actually using symbolic execution in industry these
       | days? I personally like it but I feel like fuzzing has completely
       | taken over in terms of academic research at least.
        
         | topazas wrote:
         | I would like to - but unable to find any libraries / engines
         | that would function in a some sort of 'mocked' environment. for
         | example - i need to cover all execution paths for only single
         | function with high cyclomatic complexity, given all other stuff
         | is mocked. Maybe it would be called unit test mix with se. also
         | for dynamic languages such as php/python/ruby.
        
         | drdrey wrote:
         | does Kani count?
         | 
         | https://github.com/model-checking/kani
        
         | nekitamo wrote:
         | I've been using Triton a lot lately to make sense of heavily
         | obfuscated code. The ability to translate a symbolic "trace"
         | into an LLVM bitcode listing is super useful. You can do a lot
         | of optimizations from there easily to recover the original
         | code:
         | 
         | https://github.com/JonathanSalwan/Triton/wiki
        
           | __alexander wrote:
           | Your deobfuscating process would make a good blog post :)
        
       ___________________________________________________________________
       (page generated 2024-08-27 23:00 UTC)