CryptoGuardOSS / cryptoapi-bench
☆12Updated 2 years ago
Alternatives and similar repositories for cryptoapi-bench:
Users that are interested in cryptoapi-bench are comparing it to the libraries listed below
- ☆56Updated last year
- Recent Paper About Bug Detection☆31Updated 5 years ago
- ☆49Updated 4 years ago
- ☆74Updated 2 years ago
- User Guided API Misuse Detection☆29Updated 2 years ago
- ☆68Updated 3 years ago
- ☆44Updated 2 years ago
- DLFuzz: An Efficient Fuzzing Testing Framework of Deep Learning Systems☆52Updated 6 years ago
- ☆98Updated 6 months ago
- Large-scale Analysis of Cryptographic Misuse in IoT Devices☆22Updated 5 years ago
- ☆24Updated last year
- ☆39Updated last year
- tool of llm-based indirect-call analyzer☆18Updated 2 months ago
- This is a deep learning dataset for cross-version binary code similarity detection.☆27Updated 6 years ago
- Flow analysis using Soot☆51Updated 4 years ago
- Non-Distinguishable Inconsistencies as a Deterministic Oracle for Detecting Security Bugs☆14Updated 2 years ago
- The public dataset in the paper "PatchDB: A Large-Scale Security Patch Dataset". This paper appears in the 51st Annual IEEE/IFIP Interna…☆40Updated last year
- CheQ: Automatically Identifying Security Checks for Detecting Kernel Semantic Bugs☆43Updated 5 years ago
- TypeDive: Multi-Layer Type Analysis (MLTA) for Refining Indirect-Call Targets☆93Updated last year
- ☆98Updated 6 months ago
- The released code of FuzzGuard in USENIX Security 2020.☆29Updated 5 years ago
- holding data and processing code for the paper 'A Large-Scale Empirical Study on Vulnerability Distribution within Projects and the Lesso…☆20Updated 4 years ago
- Use on-demand control- data- flow slicing combined with taint analysis and symbolic execution to produce scalable and precise UB detectio…☆23Updated 3 years ago
- Build Docker images for unibench☆16Updated 4 years ago
- Detect missing check bugs in OS kernels☆109Updated last year
- Research artifact for Oakland (S&P) 2022, "BEACON: Directed Grey-Box Fuzzing with Provable Path Pruning"☆36Updated 7 months ago
- ☆25Updated 3 years ago
- 20 benchmark programs☆47Updated 4 years ago
- ISSTA'23 - Third-party Library Dependency for Large-scale SCA in the C/C++ Ecosystem: How Far Are We?☆29Updated last year
- VUDDY: A Scalable and Accurate Vulnerable Code Clone Detector (S&P'17)☆51Updated 2 months ago