cbmc
sudoku-cbmc
cbmc | sudoku-cbmc | |
---|---|---|
5 | 1 | |
765 | 5 | |
3.5% | - | |
9.9 | 10.0 | |
2 days ago | almost 7 years ago | |
C++ | C++ | |
GNU General Public License v3.0 or later | GNU Lesser General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
cbmc
-
Xr0 Makes C Safer than Rust
This appears to be more limited than what CBMC[1] (the C Bounded Model Checker) can do. CBMC can do function contracts. CBMC can prove memory safety and even the absence of memory leaks for non-trivial code bases that pass pointers all over the place that must eventually be freed. Applying all the annotations to make this happen though is like 10x the work of getting the program actually running in the first place. CBMC definitely makes C safer than even safe Rust for projects that can invest the time to use it. There is an experimental Rust front end to CBMC called Kani[2] that aims to verify unsafe Rust (thus making unsafe Rust become safe) but it is far from the speed and robustness of the C front end.
[1] https://github.com/diffblue/cbmc
[2] https://github.com/model-checking/kani
-
The C Bounded Model Checker: Criminally Underused
https://github.com/diffblue/cbmc/issues/7732 I'll note that some form of undefined behavior checking / documentation is on the roadmap for the next major version
- CBMC: The C Bounded Model Checker
-
Using the Kani Rust Verifier on Tokio Bytes
So it seems to use cmbc and a bunch of other tools from cprover under the hood (bundled in the github release and setup on first run...). I would really like to have this "how" more visible in the documentation, it's essential to hint at the limitations of such an automated prover, even if the underlying system is rather powerful.
-
Hard Things in Computer Science
> The only reliable way to have bug-free code is to prove it. It requires solid mathematical foundations and a programming language that allows formal proofs.
I'm going to be the "actually" guy and say that, actually, you can formally verify some studff about programs written in traditional/mainstream languages, like C. Matter of fact, this is a pretty lively research area, with some tools like CBMC [0] and Infer [1] also getting significant adoption in the industry.
[0]: https://github.com/diffblue/cbmc
[1]: https://fbinfer.com/
sudoku-cbmc
What are some alternatives?
infer - A static analyzer for Java, C, C++, and Objective-C
tis-interpreter - An interpreter for finding subtle bugs in programs written in standard C
c-semantics - Semantics of C in K
coreHTTP - Client implementation of a subset of HTTP 1.1 protocol designed for embedded devices.
kani - Kani Rust Verifier
dmd - dmd D Programming Language compiler