Practical-Formal-Methods / tailor
Framework for automatically tailoring an abstract interpreter to the code under analysis and any given resource constraints
☆20Updated 3 years ago
Alternatives and similar repositories for tailor:
Users that are interested in tailor are comparing it to the libraries listed below
- QueryFuzz implements a metamorphic testing approach to test Datalog engines.☆36Updated 3 years ago
- UFO: Predictive Detection of Concurrency Use-After-Free Vulnerabilities☆32Updated 5 years ago
- ☆11Updated 3 years ago
- Proximal Gradient Analysis open source release based on our USENIX Security 2021 paper: "Fine Grained Dataflow Analysis with Proximal Gra…☆32Updated 3 years ago
- Sys, but no longer in Haskell☆18Updated 3 years ago
- Grey-box fuzzer SIVO☆14Updated 3 years ago
- "Seed Selection for Successful Fuzzing" artifact (at ISSTA 2021)☆42Updated 2 years ago
- Concolic analysis tool for Java☆21Updated last year
- MemLock: Memory Usage Guided Fuzzing☆33Updated 4 years ago
- ☆25Updated 3 years ago
- ☆24Updated 2 years ago
- FastKLEE: Faster Symbolic Execution via Reducing Redundant Bound Checking of Type-Safe Pointers☆20Updated last year
- ☆20Updated 6 years ago
- ☆13Updated 6 months ago
- An approximate solver for concolic execution☆18Updated 3 years ago
- Precise and Signedness Agnostic Interval Analysis for LLVM IR -- This website is obsolete. However, the wrapped interval domain is now im…☆12Updated 7 years ago
- ☆27Updated 2 years ago
- JIGSAW is a fuzzing-based path constraint solver.☆69Updated 10 months ago
- KLEE / CSE Project☆45Updated 5 years ago
- FoRTE-Research's fuzzing benchmarks☆56Updated 6 years ago
- Source code of MEUZZ fuzzer☆45Updated 3 years ago
- Linear-time Temporal Logic guided Greybox Fuzzing (ICSE'22)☆55Updated last year
- experiments for IJON☆12Updated 5 years ago
- ☆20Updated 7 months ago
- Public release items for the DARPA Space/Time Analysis for Cybersecurity (STAC) program☆27Updated 6 years ago
- Fuzzing Parsers with Tokens☆32Updated 4 years ago
- ☆9Updated 11 months ago
- Symbolic Program Slicing with LLVM☆79Updated 4 years ago
- Map2Check: Finding Software Vulnerabilities☆28Updated 4 years ago
- Indexing reachability for context-sensitive data flow analysis.☆11Updated 2 years ago