BanditFuzz / BanditFuzz_Public
Public BanditFuzz Repo
☆12Updated 4 years ago
Alternatives and similar repositories for BanditFuzz_Public:
Users that are interested in BanditFuzz_Public are comparing it to the libraries listed below
- MachSMT: An ML-Driven Algorithm Selection tool for SMT Solvers☆20Updated last year
- DIG is a numerical invariant generation tool. It infers program invariants or properties over (i) program execution traces or (ii) progra…☆40Updated 6 months ago
- ☆25Updated 3 years ago
- Framework for automatically tailoring an abstract interpreter to the code under analysis and any given resource constraints☆20Updated 3 years ago
- ☆8Updated 9 months ago
- ☆16Updated 9 months ago
- Linear-time Temporal Logic guided Greybox Fuzzing (ICSE'22)☆53Updated 11 months ago
- ☆11Updated 3 years ago
- A model-based API Fuzzer for SMT Solvers.☆13Updated this week
- Fuzzer and generator for string and regex problems in SMT-LIB 2.x format.☆20Updated 3 years ago
- Map2Check: Finding Software Vulnerabilities☆28Updated 4 years ago
- A Hybrid Verification Tool for Finding Software Vulnerabilities in IoT Cryptographic Protocols☆16Updated 9 months ago
- Proximal Gradient Analysis open source release based on our USENIX Security 2021 paper: "Fine Grained Dataflow Analysis with Proximal Gra…☆32Updated 3 years ago
- ☆19Updated 3 years ago
- An approximate solver for concolic execution☆17Updated 3 years ago
- CoREBench: Errors in Find, Grep, Make☆14Updated 9 years ago
- ☆39Updated last year
- "Seed Selection for Successful Fuzzing" artifact (at ISSTA 2021)☆42Updated 2 years ago
- Applied Symbolic Execution with KLEE/LLVM☆24Updated 11 years ago
- Sys, but no longer in Haskell☆18Updated 2 years ago
- ☆10Updated 4 years ago
- ☆11Updated 3 years ago
- Version of IKOS abstract interpreter implementing parallel deterministic fixpoint computation☆16Updated 4 years ago
- ☆20Updated 6 years ago
- Human-In-The-Loop Automatic Program Repair☆19Updated 5 years ago
- Binsec/Haunted is an extension of Binsec to verify speculative constant-time and detect Spectre attacks.☆16Updated last year
- ☆27Updated last week
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆32Updated last month
- UFO: Predictive Detection of Concurrency Use-After-Free Vulnerabilities☆32Updated 5 years ago
- Replication package for the paper "Systematically Covering Input Structure" published at ASE 2019☆9Updated last year