Apogee-Research / STAC
Public release items for the DARPA Space/Time Analysis for Cybersecurity (STAC) program
☆27Updated 6 years ago
Alternatives and similar repositories for STAC:
Users that are interested in STAC are comparing it to the libraries listed below
- UFO: Predictive Detection of Concurrency Use-After-Free Vulnerabilities☆32Updated 5 years ago
- Framework for automatically tailoring an abstract interpreter to the code under analysis and any given resource constraints☆20Updated 3 years ago
- APISan: Sanitizing API Usages through Semantic Cross-Checking☆63Updated 3 years ago
- Symbolic Program Slicing with LLVM☆79Updated 4 years ago
- PTABen: Micro-benchmark Suite for Pointer Analysis☆74Updated last week
- ☆20Updated 6 years ago
- ☆39Updated last year
- ☆27Updated last month
- ☆25Updated 3 years ago
- KLEE / CSE Project☆44Updated 4 years ago
- Proximal Gradient Analysis open source release based on our USENIX Security 2021 paper: "Fine Grained Dataflow Analysis with Proximal Gra…☆32Updated 3 years ago
- Linear-time Temporal Logic guided Greybox Fuzzing (ICSE'22)☆54Updated 11 months ago
- An external project example using SVF as a library☆20Updated 3 weeks ago
- ☆39Updated 4 years ago
- A tool for analyzing LLVM bitcode using Datalog.☆100Updated 4 years ago
- "Seed Selection for Successful Fuzzing" artifact (at ISSTA 2021)☆42Updated 2 years ago
- ☆53Updated 7 years ago
- Clang static checker that carries out tainting analysis.☆88Updated 7 years ago
- ☆21Updated 2 years ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆32Updated 2 months ago
- User Guided API Misuse Detection☆28Updated 2 years ago
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆28Updated 4 years ago
- JIGSAW is a fuzzing-based path constraint solver.☆69Updated 9 months ago
- FoRTE-Research's fuzzing benchmarks☆56Updated 6 years ago
- CClyzer port to souffle lang☆18Updated last year
- Concolic analysis tool for Java☆21Updated last year
- ☆44Updated 2 years ago
- RTFM! Automatic Assumption Discovery and VerificationDerivation from Library Document for API Misuse Detection☆16Updated 3 years ago
- MemLock: Memory Usage Guided Fuzzing☆33Updated 4 years ago
- ☆39Updated 2 years ago