ARISTODE / program-dependence-graph
Program dependence graph in LLVM
☆35Updated 10 months ago
Alternatives and similar repositories for program-dependence-graph:
Users that are interested in program-dependence-graph are comparing it to the libraries listed below
- ☆38Updated last year
- TypeDive: Multi-Layer Type Analysis (MLTA) for Refining Indirect-Call Targets☆95Updated last year
- ☆80Updated last month
- CheQ: Automatically Identifying Security Checks for Detecting Kernel Semantic Bugs☆44Updated 5 years ago
- Research artifact for Oakland (S&P) 2024, "Titan: Efficient Multi-target Directed Greybox Fuzzing"☆53Updated 2 months ago
- Precise and high-order static points-to/taint analysis based on LLVM IR.☆77Updated 2 years ago
- Learning and Teaching Software Analysis and Verification via SVF☆23Updated last year
- PTABen: Micro-benchmark Suite for Pointer Analysis☆78Updated this week
- Teaching and Learning Software Verification via SVF☆33Updated last month
- Software Security Analysis Course☆59Updated this week
- ☆39Updated 2 years ago
- RTFM! Automatic Assumption Discovery and VerificationDerivation from Library Document for API Misuse Detection☆16Updated 3 years ago
- ☆23Updated 2 weeks ago
- Research artifact for Oakland (S&P) 2022, "BEACON: Directed Grey-Box Fuzzing with Provable Path Pruning"☆37Updated 7 months ago
- ☆14Updated 10 months ago
- Lifting network implementation to precise format specification☆24Updated 2 weeks ago
- 20 benchmark programs☆47Updated 4 years ago
- StateFuzz: System Call-Based State-Aware Linux Driver Fuzzing☆93Updated last year
- Symbolic Program Slicing with LLVM☆80Updated 4 years ago
- Linear-time Temporal Logic guided Greybox Fuzzing (ICSE'22)☆53Updated last year
- Pre-built bitcode files for the Linux kernel☆22Updated 5 years ago
- Use on-demand control- data- flow slicing combined with taint analysis and symbolic execution to produce scalable and precise UB detectio…☆23Updated 3 years ago
- ☆39Updated last year
- JIGSAW is a fuzzing-based path constraint solver.☆68Updated 11 months ago
- Origin-sensitive Control Flow Integrity (OS-CFI) - USENIX Security 2019☆37Updated 3 years ago
- UBGen can generate programs with undefined behaviors (e.g., buffer-overflow, use-after-free, etc.)☆60Updated 3 weeks ago
- A use-after-free checker based on SVF.☆21Updated 7 years ago
- Artifact for IEEE Security and Privacy 2022 paper: "SoK: Demystifying Binary Lifters Through the Lens of Downstream Applications"☆29Updated 2 years ago
- ☆71Updated 2 years ago
- some notes for how to build projects into a single LLVM bitcode file.☆18Updated 6 years ago