Apogee-Research / STAC
Public release items for the DARPA Space/Time Analysis for Cybersecurity (STAC) program
☆26Updated 6 years ago
Alternatives and similar repositories for STAC:
Users that are interested in STAC are comparing it to the libraries listed below
- ☆20Updated 6 years ago
- UFO: Predictive Detection of Concurrency Use-After-Free Vulnerabilities☆32Updated 4 years ago
- APISan: Sanitizing API Usages through Semantic Cross-Checking☆63Updated 3 years ago
- KLEE / CSE Project☆43Updated 4 years ago
- Framework for automatically tailoring an abstract interpreter to the code under analysis and any given resource constraints☆20Updated 3 years ago
- Precise and Signedness Agnostic Interval Analysis for LLVM IR -- This website is obsolete. However, the wrapped interval domain is now im…☆12Updated 7 years ago
- ☆40Updated 2 years ago
- ☆25Updated 3 years ago
- Clang static checker that carries out tainting analysis.☆88Updated 6 years ago
- Symbolic Program Slicing with LLVM☆77Updated 4 years ago
- ☆39Updated last year
- PTABen: Micro-benchmark Suite for Pointer Analysis☆73Updated this week
- A tool for analyzing LLVM bitcode using Datalog.☆99Updated 4 years ago
- ☆39Updated 3 years ago
- CClyzer port to souffle lang☆18Updated 11 months ago
- Proximal Gradient Analysis open source release based on our USENIX Security 2021 paper: "Fine Grained Dataflow Analysis with Proximal Gra…☆32Updated 3 years ago
- ☆19Updated 3 years ago
- ☆27Updated 4 months ago
- ☆50Updated 7 years ago
- Concolic analysis tool for Java☆21Updated last year
- Tool for detecting error handling bugs☆22Updated 8 years ago
- MemLock: Memory Usage Guided Fuzzing☆33Updated 4 years ago
- Experimental translation of llvm to smt.☆56Updated 4 years ago
- "Seed Selection for Successful Fuzzing" artifact (at ISSTA 2021)☆41Updated 2 years ago
- DIG is a numerical invariant generation tool. It infers program invariants or properties over (i) program execution traces or (ii) progra…☆39Updated 4 months ago
- Use on-demand control- data- flow slicing combined with taint analysis and symbolic execution to produce scalable and precise UB detectio…☆23Updated 3 years ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆31Updated 7 months ago
- ☆20Updated 2 years ago
- Precise and high-order static points-to/taint analysis based on LLVM IR.☆72Updated 2 years ago
- Linear-time Temporal Logic guided Greybox Fuzzing (ICSE'22)☆53Updated 9 months ago