Lancern / llvm-andersonLinks
Anderson points-to analysis implementation based on LLVM
☆12Updated 4 years ago
Alternatives and similar repositories for llvm-anderson
Users that are interested in llvm-anderson are comparing it to the libraries listed below
Sorting:
- Teaching and Learning Software Analysis via SVF☆211Updated last month
- Precise and high-order static points-to/taint analysis based on LLVM IR.☆87Updated 2 months ago
- [ICSE 2022] Controlled Concurrency Testing via Periodical Scheduling☆36Updated 3 years ago
- A use-after-free checker based on SVF.☆20Updated 7 years ago
- Detect missing check bugs in OS kernels☆111Updated 2 years ago
- Static Analysis Course☆80Updated 2 months ago
- CheQ: Automatically Identifying Security Checks for Detecting Kernel Semantic Bugs☆45Updated 6 years ago
- ☆24Updated 2 months ago
- Bug detection framework for finding Finger tracable bugs in Linux☆21Updated 8 months ago
- ☆16Updated last year
- TypeDive: Multi-Layer Type Analysis (MLTA) for Refining Indirect-Call Targets☆97Updated last week
- ☆42Updated 3 years ago
- Research artifact for Oakland (S&P) 2024, "Titan: Efficient Multi-target Directed Greybox Fuzzing"☆56Updated 9 months ago
- 20 benchmark programs☆51Updated 4 years ago
- Pre-built bitcode files for the Linux kernel☆22Updated 6 years ago
- StateFuzz: System Call-Based State-Aware Linux Driver Fuzzing☆97Updated 2 years ago
- A universal seed scheduler for fuzzers (LibFuzzer and AFL havoc mode) and concolic execution engine (qsym).☆120Updated 2 years ago
- ☆36Updated 2 years ago
- CAMP: Compiler and Allocator-based Heap Memory Protection (USENIX Security 2024) ✨ Please give a star to https://github.com/cla7aye15I4nd…☆46Updated last year
- [USENIX SECURITY'19] PeX: A Permission Check Analysis Framework for Linux Kernel☆77Updated 3 years ago
- ☆36Updated 4 months ago
- ☆28Updated 3 months ago
- AFLTurbo☆30Updated 3 years ago
- Concurrency Paper☆113Updated 2 years ago
- Source code of ASAN--☆102Updated last year
- Research artifact for Oakland (S&P) 2022, "BEACON: Directed Grey-Box Fuzzing with Provable Path Pruning"☆40Updated last year
- ☆70Updated last year
- Non-Distinguishable Inconsistencies as a Deterministic Oracle for Detecting Security Bugs☆14Updated 3 years ago
- Detecting Concurrency Memory Corruption Vulnerabilities (ESEC/FSE 2019)☆14Updated last year
- ☆68Updated 4 years ago