LPhD / JessLinks
Jess is short for Joern extended by Semantic Slicing. This tool allows you to import C code into a Code Property Graph, and then compute a Semantic Slice (a subset of your program implementing a selected functionality).
☆17Updated last year
Alternatives and similar repositories for Jess
Users that are interested in Jess are comparing it to the libraries listed below
Sorting:
- Proximal Gradient Analysis open source release based on our USENIX Security 2021 paper: "Fine Grained Dataflow Analysis with Proximal Gra…☆32Updated 4 years ago
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆31Updated 4 years ago
- ☆12Updated 4 years ago
- Source code of MEUZZ fuzzer☆46Updated 4 years ago
- ☆26Updated 3 years ago
- A fuzzy parser for C/C++ that creates semantic code property graphs☆37Updated 5 years ago
- Indexing reachability for context-sensitive data flow analysis.☆12Updated 3 years ago
- Grey-box fuzzer SIVO☆13Updated 4 years ago
- Pythia (extends AFL with Predictions)☆66Updated 4 years ago
- MTFuzz: Fuzzing with a Multi-Task Neural Network☆36Updated 4 years ago
- FoRTE-Research's fuzzing benchmarks☆57Updated 6 years ago
- KLEE / CSE Project☆48Updated 5 years ago
- ☆43Updated 3 years ago
- "Seed Selection for Successful Fuzzing" artifact (at ISSTA 2021)☆42Updated 3 years ago
- Compiler-assisted Code Randomization (CCR) Toolchain☆66Updated 3 years ago
- ☆34Updated 4 years ago
- Decompiler Fuzzing Test with EMI mutation☆16Updated 5 years ago
- Symbolic Execution Over Processor Traces☆126Updated last year
- APISan: Sanitizing API Usages through Semantic Cross-Checking☆64Updated 4 years ago
- Coverage-guided grammar aware fuzzer that uses grammar automatons☆75Updated 4 years ago
- List the real world programs evaluated in fuzzing papers.☆56Updated 7 years ago
- ☆90Updated 4 years ago
- Concolic analysis tool for Java☆21Updated 2 years ago
- ☆39Updated 5 years ago
- source code for savior fuzzer☆127Updated 5 years ago
- ☆53Updated 8 years ago
- UFO: Predictive Detection of Concurrency Use-After-Free Vulnerabilities☆33Updated 5 years ago
- Ankou: Guiding Grey-box Fuzzing towards Combinatorial Difference (ICSE '20)☆54Updated 5 years ago
- Utilities for generating dynamic traces☆94Updated 10 months ago
- Signature-based Static Analysis for Detecting Recurring Vulnerabilities☆50Updated last year