top | item 6324215

Bugchecker.net – finds bugs in your binaries (symbolic execution)

33 points| wololo | 12 years ago |bugchecker.net

15 comments

order

k4st|12 years ago

As someone that does dynamic binary translation for kernel modules (to find bugs) and eventually wants to get into symbolic/concolic execution (to find bugs), this is cool. I would be really pleased if they're able to make a successful business out of this!

wololo|12 years ago

Thanks! If you have any advice, we are all ears.

TrainedMonkey|12 years ago

Just read about: http://bugchecker.net/about - apparently only x86-64 Linux executives. Which is still pretty awesome.

wololo|12 years ago

Thanks for reporting this, looking into it. The Windows support is fairly unstable right now. About page updated.

dmix|12 years ago

I would change on the website:

1) Upload binary 2) Receive Bugs

to:

1) Upload binary 2) Discover Bugs

nwmcsween|12 years ago

Have you thought of using something besides uclibc? uclibc has all kinds of corner cases of non-conformity, musl would be a somewhat better alternative. Can this work on shared libraries as well if given a header?

wololo|12 years ago

* It doesn't use uclibc. The way it works is the guest program is a snapshot of the target program process after it has been linked with its shared libraries. Usually this means it's linked with glibc (but not necessarily -- cyanogenmod programs are linked with bionic).

* Shared libraries: yes, and it doesn't need a header. Not supported yet in the interface. It does need access to the function symbols though.