PKU-ASAL / SeeWasm
A native symbolic execution engine for WebAssembly
☆43Updated 7 months ago
Alternatives and similar repositories for SeeWasm:
Users that are interested in SeeWasm are comparing it to the libraries listed below
- Precise and high-order static points-to/taint analysis based on LLVM IR.☆72Updated 2 years ago
- WASEM - a general symbolic execution framework for WebAssembly (WASM) binaries☆13Updated 4 months ago
- ☆33Updated last year
- JIGSAW is a fuzzing-based path constraint solver.☆70Updated 8 months ago
- ☆27Updated 3 years ago
- OBsan: An Out-Of-Bound Sanitizer to Harden DNN Executables☆17Updated last year
- UBGen can generate programs with undefined behaviors (e.g., buffer-overflow, use-after-free, etc.)☆57Updated 10 months ago
- A Pointer Analysis Framework for Rust☆48Updated 2 weeks ago
- ☆39Updated 2 years ago
- "Seed Selection for Successful Fuzzing" artifact (at ISSTA 2021)☆42Updated 2 years ago
- Concurrency Paper☆102Updated last year
- Fuzzer that searches for vulnerabilities like Spectre and Meltdown in CPUs☆42Updated 2 years ago
- ☆46Updated 3 years ago
- A data dependence analyzer for C program☆20Updated 3 years ago
- RTFM! Automatic Assumption Discovery and VerificationDerivation from Library Document for API Misuse Detection☆16Updated 3 years ago
- Progressive Scrutiny: Incremental Detection of UBI bugs in the Linux Kernel☆29Updated 2 years ago
- Indexing reachability for context-sensitive data flow analysis.☆11Updated 2 years ago
- Artifact for IEEE Security and Privacy 2022 paper: "SoK: Demystifying Binary Lifters Through the Lens of Downstream Applications"☆30Updated 2 years ago
- Papers related with kernel papers☆13Updated last year
- CAMP: Compiler and Allocator-based Heap Memory Protection (USENIX Security 2024) ✨ Please give a star to https://github.com/cla7aye15I4nd…☆38Updated 7 months ago
- An standalone execution trace library built on DynamoRIO.☆22Updated 2 years ago
- Linear-time Temporal Logic guided Greybox Fuzzing (ICSE'22)☆53Updated 10 months ago
- An external project example using SVF as a library☆20Updated 4 months ago
- This repository contains the source code related to the research paper titled "Temporal System Call Specialization for Attack Surface Red…☆35Updated 3 months ago
- UFO: Predictive Detection of Concurrency Use-After-Free Vulnerabilities☆32Updated 5 years ago
- ☆27Updated 2 years ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆31Updated 3 weeks ago
- ☆12Updated 7 months ago
- KLEE / CSE Project☆43Updated 4 years ago
- The Use of Likely Invariants as Feedback for Fuzzers☆88Updated 3 years ago