FAU-Inf2 / StarSmith
This repository accompanies the research paper "P. Kreutzer, S. Kraus, M. Philippsen: Language-Agnostic Generation of Compilable Test Programs" published at ICST'20.
☆12Updated 2 years ago
Alternatives and similar repositories for StarSmith
Users that are interested in StarSmith are comparing it to the libraries listed below
Sorting:
- ☆16Updated 3 months ago
- An empirical study on patch correctness☆15Updated 2 years ago
- ☆22Updated 2 years ago
- ☆20Updated 3 years ago
- Program Vulnerability Repair via Inductive Inference☆20Updated last year
- A mutation tool for source and IR☆13Updated 6 years ago
- Mutation-guided mutation-based fuzz testing☆45Updated 10 months ago
- ☆40Updated last year
- ☆11Updated 4 years ago
- DBGBench Website:☆18Updated 4 years ago
- Slicing tool for c++ programs using clang AST.☆17Updated 4 years ago
- ☆33Updated this week
- ☆14Updated 4 years ago
- CoREBench: Errors in Find, Grep, Make☆13Updated 9 years ago
- A tool for analyzing LLVM bitcode using Datalog.☆100Updated 4 years ago
- Replication package for the paper "Systematically Covering Input Structure" published at ASE 2019☆9Updated last year
- Precise and Signedness Agnostic Interval Analysis for LLVM IR -- This website is obsolete. However, the wrapped interval domain is now im…☆12Updated 7 years ago
- Grammar synthesis algorithm using a black box oracle☆36Updated last year
- Version of IKOS abstract interpreter implementing parallel deterministic fixpoint computation☆16Updated 4 years ago
- A framework for testing compilers' type checkers☆17Updated 6 months ago
- Concolic analysis tool for Java☆21Updated last year
- ☆27Updated 2 years ago
- ☆25Updated 3 years ago
- Replication package for Mining Input Grammars From Dynamic Control Flow☆25Updated 4 years ago
- PTABen: Micro-benchmark Suite for Pointer Analysis☆78Updated last week
- ☆16Updated 5 years ago
- KLEE / CSE Project☆45Updated 5 years ago
- Symbolic Program Slicing with LLVM☆80Updated 4 years ago
- UFO: Predictive Detection of Concurrency Use-After-Free Vulnerabilities☆32Updated 5 years ago
- Indexing reachability for context-sensitive data flow analysis.☆11Updated 2 years ago