Programming-Systems-Lab / dyclink
☆9Updated 6 years ago
Alternatives and similar repositories for dyclink:
Users that are interested in dyclink are comparing it to the libraries listed below
- Proximal Gradient Analysis open source release based on our USENIX Security 2021 paper: "Fine Grained Dataflow Analysis with Proximal Gra…☆32Updated 3 years ago
- Concolic analysis tool for Java☆21Updated last year
- KLEE / CSE Project☆43Updated 4 years ago
- ☆39Updated 2 years ago
- UFO: Predictive Detection of Concurrency Use-After-Free Vulnerabilities☆32Updated 5 years ago
- A python interface to joern (deprecated).☆34Updated 6 years ago
- Clang static checker that carries out tainting analysis.☆88Updated 6 years ago
- ☆26Updated 9 years ago
- ☆19Updated 3 years ago
- ☆14Updated 7 years ago
- FoRTE-Research's fuzzing benchmarks☆56Updated 5 years ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆31Updated 3 weeks ago
- ☆50Updated 7 years ago
- ReDeBug Source Code.☆24Updated last year
- ☆10Updated 5 years ago
- ☆20Updated 6 years ago
- ☆44Updated 2 years ago
- ☆40Updated last year
- ☆20Updated 3 years ago
- ☆25Updated 3 years ago
- MemLock: Memory Usage Guided Fuzzing☆33Updated 4 years ago
- Replication package for the paper "Systematically Covering Input Structure" published at ASE 2019☆9Updated last year
- Concolic Execution Fuzzer☆24Updated 3 years ago
- The public dataset in the paper "PatchDB: A Large-Scale Security Patch Dataset". This paper appears in the 51st Annual IEEE/IFIP Interna…☆38Updated last year
- IntFlow is an LLVM-based arithmetic error detection tool that combines static information flow tracking and dynamic program analysis☆16Updated 9 years ago
- ☆20Updated 2 years ago
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆28Updated 3 years ago
- A tool to manage, conduct, and assess dictionary-based fuzz testing☆64Updated 7 years ago
- ☆56Updated 3 years ago
- APISan: Sanitizing API Usages through Semantic Cross-Checking☆63Updated 3 years ago