Practical-Formal-Methods / DeepSearch
Reproduction Code for FSE Paper "DeepSearch: A Simple and Effective Blackbox Attack for Deep Neural Networks"
☆12Updated 4 years ago
Alternatives and similar repositories for DeepSearch:
Users that are interested in DeepSearch are comparing it to the libraries listed below
- Framework for automatically tailoring an abstract interpreter to the code under analysis and any given resource constraints☆20Updated 3 years ago
- ☆11Updated 4 years ago
- Public BanditFuzz Repo☆12Updated 4 years ago
- ☆39Updated last year
- Static Analyzer and Verifier☆46Updated 4 months ago
- A model-based API Fuzzer for SMT Solvers.☆13Updated this week
- ☆20Updated 6 years ago
- Program Vulnerability Repair via Inductive Inference☆18Updated last year
- A Hybrid Verification Tool for Finding Software Vulnerabilities in IoT Cryptographic Protocols☆16Updated 9 months ago
- Keep your bugs contained. A platform for studying historical software bugs.☆68Updated 2 months ago
- DIG is a numerical invariant generation tool. It infers program invariants or properties over (i) program execution traces or (ii) progra…☆40Updated 6 months ago
- A tool for testing SMT solvers for incompleteness bugs☆15Updated 2 years ago
- ☆16Updated 5 years ago
- The public dataset in the paper "PatchDB: A Large-Scale Security Patch Dataset". This paper appears in the 51st Annual IEEE/IFIP Interna…☆38Updated last year
- the code for three models introduced in DYNAMIC NEURAL PROGRAM EMBEDDINGS FOR PROGRAM REPAIR (ICLR 18)☆32Updated 6 years ago
- Linear-time Temporal Logic guided Greybox Fuzzing (ICSE'22)☆53Updated 11 months ago
- Fuzzer and generator for string and regex problems in SMT-LIB 2.x format.☆20Updated 3 years ago
- Precise and Signedness Agnostic Interval Analysis for LLVM IR -- This website is obsolete. However, the wrapped interval domain is now im…☆12Updated 7 years ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆32Updated last month
- Public release items for the DARPA Space/Time Analysis for Cybersecurity (STAC) program☆26Updated 6 years ago
- "Seed Selection for Successful Fuzzing" artifact (at ISSTA 2021)☆42Updated 2 years ago
- MachSMT: An ML-Driven Algorithm Selection tool for SMT Solvers☆20Updated last year
- User Guided API Misuse Detection☆28Updated 2 years ago
- Piecewise debloating toolchain☆14Updated 5 years ago
- Challenge binaries (CBs) and tools from DARPA's Cyber Grand Challenge (CGC)☆17Updated 3 years ago
- ☆20Updated 8 years ago
- UFO: Predictive Detection of Concurrency Use-After-Free Vulnerabilities☆32Updated 5 years ago
- ☆39Updated 2 years ago
- A System for Debloating C/C++ Programs☆31Updated 3 years ago
- This repository the benchmark with 3902 defects extracted from C programs in Codeforces (http://codeforces.com/)☆39Updated 4 years ago