LPhD / Jess
Jess is short for Joern extended by Semantic Slicing. This tool allows you to import C code into a Code Property Graph, and then compute a Semantic Slice (a subset of your program implementing a selected functionality).
☆15Updated 9 months ago
Alternatives and similar repositories for Jess:
Users that are interested in Jess are comparing it to the libraries listed below
- Proximal Gradient Analysis open source release based on our USENIX Security 2021 paper: "Fine Grained Dataflow Analysis with Proximal Gra…☆32Updated 3 years ago
- ReDeBug Source Code.☆24Updated last year
- A fuzzy parser for C/C++ that creates semantic code property graphs☆36Updated 4 years ago
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆28Updated 4 years ago
- The public dataset in the paper "PatchDB: A Large-Scale Security Patch Dataset". This paper appears in the 51st Annual IEEE/IFIP Interna…☆38Updated last year
- ☆56Updated 3 years ago
- "Seed Selection for Successful Fuzzing" artifact (at ISSTA 2021)☆42Updated 2 years ago
- KLEE / CSE Project☆43Updated 4 years ago
- ☆27Updated 3 years ago
- ☆25Updated 3 years ago
- Gives tainting information for the provided bitcode file generated from binary.☆44Updated 7 years ago
- ☆44Updated 2 years ago
- Concolic analysis tool for Java☆21Updated last year
- UFO: Predictive Detection of Concurrency Use-After-Free Vulnerabilities☆32Updated 5 years ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆32Updated last month
- Code Property Graph (CPG) frontend for binary applications and libraries.☆86Updated 3 years ago
- FoRTE-Research's fuzzing benchmarks☆56Updated 5 years ago
- Sys, but no longer in Haskell☆18Updated 2 years ago
- Indexing reachability for context-sensitive data flow analysis.☆11Updated 2 years ago
- PTABen: Micro-benchmark Suite for Pointer Analysis☆73Updated this week
- ☆27Updated last year
- We hinder fuzzing☆66Updated 3 years ago
- A tool to manage, conduct, and assess dictionary-based fuzz testing☆64Updated 7 years ago
- VUDDY: A Scalable and Accurate Vulnerable Code Clone Detector (S&P'17)☆52Updated last month
- Source code of MEUZZ fuzzer☆45Updated 3 years ago
- The Use of Likely Invariants as Feedback for Fuzzers☆88Updated 3 years ago
- PMP: Cost-Effective Forced Execution with Probabilistic Memory Pre-Planning☆10Updated 4 years ago
- APISan: Sanitizing API Usages through Semantic Cross-Checking☆63Updated 3 years ago
- List the real world programs evaluated in fuzzing papers.☆53Updated 6 years ago
- Utilities for generating dynamic traces☆90Updated 2 years ago