cbmc VS coreHTTP

Compare cbmc vs coreHTTP and see what are their differences.

coreHTTP

Client implementation of a subset of HTTP 1.1 protocol designed for embedded devices. (by FreeRTOS)
InfluxDB - Power Real-Time Data Analytics at Scale
Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
www.influxdata.com
featured
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com
featured
cbmc coreHTTP
5 1
765 67
3.5% -
9.9 6.2
1 day ago 3 days ago
C++ C
GNU General Public License v3.0 or later MIT License
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

cbmc

Posts with mentions or reviews of cbmc. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2024-01-30.
  • Xr0 Makes C Safer than Rust
    1 project | news.ycombinator.com | 28 Mar 2024
    This appears to be more limited than what CBMC[1] (the C Bounded Model Checker) can do. CBMC can do function contracts. CBMC can prove memory safety and even the absence of memory leaks for non-trivial code bases that pass pointers all over the place that must eventually be freed. Applying all the annotations to make this happen though is like 10x the work of getting the program actually running in the first place. CBMC definitely makes C safer than even safe Rust for projects that can invest the time to use it. There is an experimental Rust front end to CBMC called Kani[2] that aims to verify unsafe Rust (thus making unsafe Rust become safe) but it is far from the speed and robustness of the C front end.

    [1] https://github.com/diffblue/cbmc

    [2] https://github.com/model-checking/kani

  • The C Bounded Model Checker: Criminally Underused
    7 projects | news.ycombinator.com | 30 Jan 2024
    https://github.com/diffblue/cbmc/issues/7732 I'll note that some form of undefined behavior checking / documentation is on the roadmap for the next major version
  • CBMC: The C Bounded Model Checker
    2 projects | news.ycombinator.com | 7 Feb 2023
  • Using the Kani Rust Verifier on Tokio Bytes
    1 project | /r/rust | 18 Aug 2022
    So it seems to use cmbc and a bunch of other tools from cprover under the hood (bundled in the github release and setup on first run...). I would really like to have this "how" more visible in the documentation, it's essential to hint at the limitations of such an automated prover, even if the underlying system is rather powerful.
  • Hard Things in Computer Science
    2 projects | news.ycombinator.com | 28 Jun 2022
    > The only reliable way to have bug-free code is to prove it. It requires solid mathematical foundations and a programming language that allows formal proofs.

    I'm going to be the "actually" guy and say that, actually, you can formally verify some studff about programs written in traditional/mainstream languages, like C. Matter of fact, this is a pretty lively research area, with some tools like CBMC [0] and Infer [1] also getting significant adoption in the industry.

    [0]: https://github.com/diffblue/cbmc

    [1]: https://fbinfer.com/

coreHTTP

Posts with mentions or reviews of coreHTTP. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2024-01-30.
  • The C Bounded Model Checker: Criminally Underused
    7 projects | news.ycombinator.com | 30 Jan 2024
    One of the examples they gave was an HTTP client, which would be a surprisingly non-toy example, so I looked at what they actually did in the code (https://github.com/FreeRTOS/coreHTTP/tree/main/test/cbmc).

    Not that I'm an expert in processing what exactly is being tested, but it basically looks only able to prove that an individual function doesn't overrun buffers. If you tell it to assume that overflows can't happen (!). So I'm not impressed.

What are some alternatives?

When comparing cbmc and coreHTTP you can also consider the following projects:

sudoku-cbmc - SAT-based sudoku solver

tis-interpreter - An interpreter for finding subtle bugs in programs written in standard C

infer - A static analyzer for Java, C, C++, and Objective-C

kani - Kani Rust Verifier

c-semantics - Semantics of C in K

dmd - dmd D Programming Language compiler