Practical-Formal-Methods / DeepSearchLinks
Reproduction Code for FSE Paper "DeepSearch: A Simple and Effective Blackbox Attack for Deep Neural Networks"
☆13Updated 5 years ago
Alternatives and similar repositories for DeepSearch
Users that are interested in DeepSearch are comparing it to the libraries listed below
Sorting:
- ☆11Updated 4 years ago
- Public BanditFuzz Repo☆12Updated 4 years ago
- MachSMT: An ML-Driven Algorithm Selection tool for SMT Solvers☆24Updated 2 years ago
- A Hybrid Verification Tool for Finding Software Vulnerabilities in IoT Cryptographic Protocols☆16Updated last year
- Efficient Sampling of SAT Solutions for Testing☆35Updated 6 years ago
- A tool for testing SMT solvers for incompleteness bugs☆15Updated 3 years ago
- ☆19Updated last year
- Piecewise debloating toolchain☆15Updated 5 years ago
- ☆20Updated 4 years ago
- A model checker and assume/guarantee contract generator for Lustre programs.☆17Updated 7 years ago
- ☆41Updated 2 years ago
- CPR: A new automated program repair technique based on concolic execution which works on patch abstraction with the sub-optimal goal of r…☆33Updated 3 years ago
- Map2Check: Finding Software Vulnerabilities☆30Updated 5 years ago
- A model-based API Fuzzer for SMT Solvers.☆14Updated last month
- Enumerative Testing and Bounded Validation of SMT Solvers☆22Updated 4 months ago
- LinearArbitrary-SeaHorn is a CHC solver for LLVM-based languages.☆22Updated 2 years ago
- A Fast Floating-Point Satisfiability Solver☆28Updated 4 months ago
- Intrepyd Model Checker☆18Updated 4 years ago
- ELINA: ETH LIbrary for Numerical Analysis☆135Updated 2 years ago
- ADAPT is the open source white-box testing framework for deep neural networks☆22Updated 2 years ago
- Official implementation of ISSTA 2022 paper: MDPFuzz: Testing Models Solving Markov Decision Processes.☆24Updated 2 years ago
- Symbolic Program Slicing with LLVM☆85Updated 5 years ago
- DSVerifier - Digital Systems Verifier☆11Updated 6 years ago
- KLEE / CSE Project☆46Updated 5 years ago
- Program Vulnerability Repair via Inductive Inference☆20Updated last year
- Frama-C plugins for deadlock and data race detection☆14Updated 2 weeks ago
- ☆11Updated 5 years ago
- Research papers on ML for security☆35Updated 5 years ago
- Implementation of the IC3 / Property Directed Reachability algorithm using the the Z3 SMT solver.☆18Updated 9 years ago
- Linear-time Temporal Logic guided Greybox Fuzzing (ICSE'22)☆56Updated last year