Apogee-Research / STAC
Public release items for the DARPA Space/Time Analysis for Cybersecurity (STAC) program
☆26Updated 6 years ago
Alternatives and similar repositories for STAC:
Users that are interested in STAC are comparing it to the libraries listed below
- UFO: Predictive Detection of Concurrency Use-After-Free Vulnerabilities☆32Updated 5 years ago
- KLEE / CSE Project☆43Updated 4 years ago
- APISan: Sanitizing API Usages through Semantic Cross-Checking☆63Updated 3 years ago
- ☆50Updated 7 years ago
- ☆39Updated 2 years ago
- Symbolic Program Slicing with LLVM☆77Updated 4 years ago
- ☆39Updated 4 years ago
- "Seed Selection for Successful Fuzzing" artifact (at ISSTA 2021)☆42Updated 2 years ago
- ☆40Updated last year
- ☆27Updated 5 months ago
- ☆20Updated 6 years ago
- ☆25Updated 3 years ago
- Precise and Signedness Agnostic Interval Analysis for LLVM IR -- This website is obsolete. However, the wrapped interval domain is now im…☆12Updated 7 years ago
- FoRTE-Research's fuzzing benchmarks☆56Updated 5 years ago
- Linear-time Temporal Logic guided Greybox Fuzzing (ICSE'22)☆53Updated 10 months ago
- PTABen: Micro-benchmark Suite for Pointer Analysis☆73Updated this week
- Framework for automatically tailoring an abstract interpreter to the code under analysis and any given resource constraints☆20Updated 3 years ago
- MemLock: Memory Usage Guided Fuzzing☆33Updated 4 years ago
- ☆37Updated 5 years ago
- Proximal Gradient Analysis open source release based on our USENIX Security 2021 paper: "Fine Grained Dataflow Analysis with Proximal Gra…☆32Updated 3 years ago
- JIGSAW is a fuzzing-based path constraint solver.☆70Updated 8 months ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆31Updated 3 weeks ago
- Dynamic Analysis for Concurrent Programs☆22Updated 4 months ago
- Fuzzer that searches for vulnerabilities like Spectre and Meltdown in CPUs☆42Updated 2 years ago
- Precise and high-order static points-to/taint analysis based on LLVM IR.☆72Updated 2 years ago
- Clang static checker that carries out tainting analysis.☆88Updated 6 years ago
- User Guided API Misuse Detection☆27Updated 2 years ago
- ☆19Updated 3 years ago
- DIG is a numerical invariant generation tool. It infers program invariants or properties over (i) program execution traces or (ii) progra…☆40Updated 5 months ago
- Tool for detecting error handling bugs☆22Updated 8 years ago