You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
When analyzing the following code with IKOS, the analyzer reports the program as "SAFE" with no warnings, even though l is set by scanf without bounds checking. This unbounded input could lead to an out-of-bounds access on a[10], which should ideally be flagged by the buffer overflow analysis (boa):
In this example, if the user enters a value for l greater than 10, the loop will write out of bounds of the array a[10], leading to undefined behavior.
Expected Behavior
The buffer overflow analysis (boa) or other relevant checks should flag this as a potential out-of-bounds access due to unbounded user input.
Actual Behavior
IKOS reports the program as "SAFE" with no warnings, potentially overlooking the risk of unbounded user input leading to out-of-bounds access.
Could you clarify if this is a known limitation or if there are additional configuration options to enable more robust detection of potential buffer overflows with unbounded inputs?
Thank you!
The text was updated successfully, but these errors were encountered:
When analyzing the following code with IKOS, the analyzer reports the program as "SAFE" with no warnings, even though
l
is set byscanf
without bounds checking. This unbounded input could lead to an out-of-bounds access ona[10]
, which should ideally be flagged by the buffer overflow analysis (boa
):In this example, if the user enters a value for
l
greater than10
, the loop will write out of bounds of the arraya[10]
, leading to undefined behavior.Expected Behavior
The buffer overflow analysis (
boa
) or other relevant checks should flag this as a potential out-of-bounds access due to unbounded user input.Actual Behavior
IKOS reports the program as "SAFE" with no warnings, potentially overlooking the risk of unbounded user input leading to out-of-bounds access.
Could you clarify if this is a known limitation or if there are additional configuration options to enable more robust detection of potential buffer overflows with unbounded inputs?
Thank you!
The text was updated successfully, but these errors were encountered: