Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

For this usually CBMC is used. http://www.cprover.org/cbmc/

You can also use CBMC to solve the usual state reverse engineering problems, like coverage analysis, finding input for output, hash collisions, ...



Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: