cbmc VS tis-interpreter

Compare cbmc vs tis-interpreter and see what are their differences.

tis-interpreter

An interpreter for finding subtle bugs in programs written in standard C (by TrustInSoft)
InfluxDB - Power Real-Time Data Analytics at Scale
Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
www.influxdata.com
featured
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com
featured
cbmc tis-interpreter
5 2
765 561
3.5% 0.0%
9.9 10.0
2 days ago over 7 years ago
C++ OCaml
GNU General Public License v3.0 or later -
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

cbmc

Posts with mentions or reviews of cbmc. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2024-01-30.
  • Xr0 Makes C Safer than Rust
    1 project | news.ycombinator.com | 28 Mar 2024
    This appears to be more limited than what CBMC[1] (the C Bounded Model Checker) can do. CBMC can do function contracts. CBMC can prove memory safety and even the absence of memory leaks for non-trivial code bases that pass pointers all over the place that must eventually be freed. Applying all the annotations to make this happen though is like 10x the work of getting the program actually running in the first place. CBMC definitely makes C safer than even safe Rust for projects that can invest the time to use it. There is an experimental Rust front end to CBMC called Kani[2] that aims to verify unsafe Rust (thus making unsafe Rust become safe) but it is far from the speed and robustness of the C front end.

    [1] https://github.com/diffblue/cbmc

    [2] https://github.com/model-checking/kani

  • The C Bounded Model Checker: Criminally Underused
    7 projects | news.ycombinator.com | 30 Jan 2024
    https://github.com/diffblue/cbmc/issues/7732 I'll note that some form of undefined behavior checking / documentation is on the roadmap for the next major version
  • CBMC: The C Bounded Model Checker
    2 projects | news.ycombinator.com | 7 Feb 2023
  • Using the Kani Rust Verifier on Tokio Bytes
    1 project | /r/rust | 18 Aug 2022
    So it seems to use cmbc and a bunch of other tools from cprover under the hood (bundled in the github release and setup on first run...). I would really like to have this "how" more visible in the documentation, it's essential to hint at the limitations of such an automated prover, even if the underlying system is rather powerful.
  • Hard Things in Computer Science
    2 projects | news.ycombinator.com | 28 Jun 2022
    > The only reliable way to have bug-free code is to prove it. It requires solid mathematical foundations and a programming language that allows formal proofs.

    I'm going to be the "actually" guy and say that, actually, you can formally verify some studff about programs written in traditional/mainstream languages, like C. Matter of fact, this is a pretty lively research area, with some tools like CBMC [0] and Infer [1] also getting significant adoption in the industry.

    [0]: https://github.com/diffblue/cbmc

    [1]: https://fbinfer.com/

tis-interpreter

Posts with mentions or reviews of tis-interpreter. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2024-01-30.
  • The C Bounded Model Checker: Criminally Underused
    7 projects | news.ycombinator.com | 30 Jan 2024
  • GCC always assumes aligned pointer accesses
    2 projects | news.ycombinator.com | 20 Aug 2023
    What makes you think they don't understand it? They acknowledge that it is UB. I read them as realistic, since they know that people rely on C compilers work in a certain way. They even wrote an interpreter that detects UB: https://github.com/TrustInSoft/tis-interpreter

    I understand why people like the compiler being able to leverage UB. I suspect this philosophy actually makes Trust-In-Soft more money: You could argue that if there was no UB, there would be no need for the tis-interpreter.

    So isn't it in fact quite self-less that they encourage the world to optimize a bit less (spending more money on 'compute'), while standing to profit from the unintended behaviour they'd otherwise be contracted to help debug?

What are some alternatives?

When comparing cbmc and tis-interpreter you can also consider the following projects:

sudoku-cbmc - SAT-based sudoku solver

chibicc - A small C compiler

infer - A static analyzer for Java, C, C++, and Objective-C

c-semantics - Semantics of C in K

coreHTTP - Client implementation of a subset of HTTP 1.1 protocol designed for embedded devices.

dmd - dmd D Programming Language compiler

kani - Kani Rust Verifier