2020
DOI: 10.1007/978-3-030-45237-7_29
|View full text |Cite
|
Sign up to set email alerts
|

Map2Check: Using Symbolic Execution and Fuzzing

Abstract: Map2Check is a software verification tool that combines fuzzing, symbolic execution, and inductive invariants. It automatically checks safety properties in C programs by adopting source code instrumentation to monitor data (e.g., memory pointers) from the program’s executions using LLVM compiler infrastructure. For SV-COMP 2020, we extended Map2Check to exploit an iterative deepening approach using LibFuzzer and Klee to check for safety properties. We also use Crab-LLVM to infer program invariants based on rea… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(8 citation statements)
references
References 6 publications
0
8
0
Order By: Relevance
“…• FuSeBMC [26], [27]: This is a white-box fuzzer that injects labels into C programs and then use a combination of ESBMC and a path-based symbolic execution tool called Map2check [28] to find inputs that reach those labels (while checking for vulnerabilities).…”
Section: B Static Analysismentioning
confidence: 99%
“…• FuSeBMC [26], [27]: This is a white-box fuzzer that injects labels into C programs and then use a combination of ESBMC and a path-based symbolic execution tool called Map2check [28] to find inputs that reach those labels (while checking for vulnerabilities).…”
Section: B Static Analysismentioning
confidence: 99%
“…• FuSeBMC [27], [28]: This is a white-box fuzzer that injects labels into C programs and then use a combination of ESBMC and a path-based symbolic execution tool called Map2check [29] to find inputs that reach those labels (while checking for vulnerabilities).…”
Section: B Static Analysismentioning
confidence: 99%
“…Another hybrid fuzzing tool is Map2check [88] which consists of fuzzing and SE. This tool also utilizes LLVM v6.0 [89] compiler techniques to examine C language-based programs.…”
Section: ) Instrumentationmentioning
confidence: 99%
“…Similar to the LibKluzzer, another CGHF known as Map2Check also uses LibFuzzer and KLEE. To easily explore "shallow" vulnerabilities, Map2Check [88] generates random data as a test-input for C-language programs, and KLEE examines the properties of safety in a new way. Furthermore, Map2Check leverages MetaSMTs such as Yices [155] and Boolector [156] as the SMT solver.…”
Section: ) Mutation-based Hybrid Fuzzersmentioning
confidence: 99%
See 1 more Smart Citation