SVF-tools / SVF-Teaching
Learning and Teaching Software Analysis and Verification via SVF
☆22Updated 4 months ago
Related projects: ⓘ
- Precise and high-order static points-to/taint analysis based on LLVM IR.☆69Updated 2 years ago
- TypeDive: Multi-Layer Type Analysis (MLTA) for Refining Indirect-Call Targets☆76Updated 5 months ago
- Research artifact for Oakland (S&P) 2024, "Titan: Efficient Multi-target Directed Greybox Fuzzing"☆45Updated 3 months ago
- Software Security Analysis Course☆26Updated this week
- Teaching and Learning Software Verification via SVF☆32Updated 3 weeks ago
- Recent symbolic execution papers and tools.☆133Updated this week
- A use-after-free checker based on SVF.☆19Updated 6 years ago
- KernelGPT: Enhanced Kernel Fuzzing via Large Language Models☆55Updated this week
- A universal seed scheduler for fuzzers (LibFuzzer and AFL havoc mode) and concolic execution engine (qsym).☆112Updated last year
- [ICSE 2022] Controlled Concurrency Testing via Periodical Scheduling☆29Updated last year
- CheQ: Automatically Identifying Security Checks for Detecting Kernel Semantic Bugs☆42Updated 4 years ago
- PTABen: Micro-benchmark Suite for Pointer Analysis☆70Updated this week
- Concurrency Paper☆89Updated last year
- Anderson points-to analysis implementation based on LLVM☆12Updated 3 years ago
- ☆37Updated 8 months ago
- Linear-time Temporal Logic guided Greybox Fuzzing (ICSE'22)☆50Updated 5 months ago
- The source code of project "LLift" (Enhancing static analysis with LLM)☆47Updated 6 months ago
- Program dependence graph in LLVM☆31Updated 2 months ago
- StateFuzz: System Call-Based State-Aware Linux Driver Fuzzing☆92Updated last year
- Qilin: A New Framework for Supporting Fine-Grained Context-Sensitivity in Java Pointer Analysis☆118Updated last month
- Detecting Concurrency Memory Corruption Vulnerabilities (ESEC/FSE 2019)☆10Updated 9 months ago
- Research artifact for Oakland (S&P) 2022, "BEACON: Directed Grey-Box Fuzzing with Provable Path Pruning"☆29Updated this week
- ☆34Updated 3 months ago
- ☆24Updated 11 months ago
- ☆66Updated 2 months ago
- ☆25Updated 3 months ago
- UBGen can generate programs with undefined behaviors (e.g., buffer-overflow, use-after-free, etc.)☆55Updated 5 months ago
- Artifact for IEEE Security and Privacy 2022 paper: "SoK: Demystifying Binary Lifters Through the Lens of Downstream Applications"☆30Updated 2 years ago
- JIGSAW is a fuzzing-based path constraint solver.☆68Updated 3 months ago
- Recent Paper About Bug Detection☆29Updated 4 years ago