STP

A Decision Procedure for Bitvectors and Arrays

STP Main Page

STP Papers

Tools Using STP

STP_Documentation

Projects that use STP

  • Bug Finding and Symbolic Execution Tools

    • EXE is a bug finding tool that reads your C program and tries to automatically crash it. EXE has been used to find bugs in TCP/IP Filters, Berkeley Packet Filter,  Linux Disks, PCRE library. This work is being done by Cristian Cadar, Vijay Ganesh, Peter Pawlowski, Prof. Dawson Engler and Prof. David Dill at Stanford University

    • MINESWEEPER  is a tool that automatically analyzes certain malicious behavior in unix utilities and malware. This work is being done by Jim Newsome, David Brumley, Prof. Dawn Song and others at Carnegie Mellon University (CMU)

    • CATCHCONV is a bug finding tool that tries to find bugs due to type mismatch in C programs. This work is being done by David Molnar and Prof. David Wagner at University of California, Berkeley

    • Backward path-sensitive analysis of C programs to find bugs by Tim Leek from MIT Lincoln Labs

    • Bug finding in Verilog code by a major microprocessor company

    • JPF-SE is a symbolic execution extension to the Java PathFinder model checker by Saswat Anand, Corina Pasareanu and Willem Visser from NASA Ames Research Center

  • Formal Verification Tools

    • In conjunction with ACL2 to formally verify implementation of encryption algorithms in Java by Eric W. Smith and Prof. David Dill at Stanford University

    • Formal verification of Parallel Transaction Architecture by Jacob Chang and Prof. David Dill at Stanford University

  • Tools For Finding Security Exploits

    • REPLAYER is a tool that replays an application dialog between two hosts in order to find security exploits by Jim Newsome, David Brumley, Prof. Dawn Song and others at Carnegie Mellon University (CMU)