|
Projects that use STP
- Bug Finding and Symbolic
Execution Tools
- EXE is a bug
finding tool that reads your C program and tries to automatically crash
it. EXE has been used to find bugs in TCP/IP Filters, Berkeley Packet
Filter, Linux Disks, PCRE library. This work is being done by
Cristian Cadar, Vijay Ganesh, Peter Pawlowski, Prof. Dawson Engler and
Prof. David Dill at Stanford
University
- MINESWEEPER
is a tool that automatically analyzes certain malicious behavior in
unix utilities and malware. This work is being done by Jim Newsome,
David
Brumley, Prof. Dawn Song and others at Carnegie
Mellon University (CMU)
- CATCHCONV is a bug finding tool that tries to find bugs
due to
type mismatch in C programs. This work is being done by David Molnar
and Prof. David Wagner at University
of
California, Berkeley
- Backward path-sensitive analysis of C programs to find
bugs by
Tim Leek from MIT Lincoln Labs
- Bug finding in Verilog
code by a major microprocessor company
- JPF-SE
is a symbolic execution extension to the Java PathFinder
model checker by Saswat Anand, Corina Pasareanu and Willem Visser from NASA Ames Research Center
- Formal Verification Tools
- In conjunction with ACL2 to formally
verify implementation of encryption algorithms in Java by Eric W. Smith
and Prof. David Dill at Stanford
University
- Formal verification of Parallel Transaction Architecture
by
Jacob
Chang and Prof. David Dill at Stanford
University
- Tools For Finding Security
Exploits
- REPLAYER is a
tool that replays an application dialog between two hosts in order to
find security exploits by Jim Newsome, David Brumley, Prof. Dawn Song
and others at Carnegie Mellon
University (CMU)
|