SVF-tools / SVF-TeachingLinks
Learning and Teaching Software Analysis and Verification via SVF
☆26Updated 5 months ago
Alternatives and similar repositories for SVF-Teaching
Users that are interested in SVF-Teaching are comparing it to the libraries listed below
Sorting:
- Static Analysis Course☆83Updated 2 weeks ago
- Teaching and Learning Software Analysis via SVF☆210Updated 2 weeks ago
- Precise and high-order static points-to/taint analysis based on LLVM IR.☆88Updated 3 months ago
- TypeDive: Multi-Layer Type Analysis (MLTA) for Refining Indirect-Call Targets☆99Updated last month
- Recent symbolic execution papers and tools.☆181Updated 7 months ago
- KernelGPT: Enhanced Kernel Fuzzing via Large Language Models (ASPLOS 2025)☆153Updated 4 months ago
- ☆101Updated 9 months ago
- UBGen can generate programs with undefined behaviors (e.g., buffer-overflow, use-after-free, etc.)☆61Updated 7 months ago
- ☆48Updated last year
- Research artifact for Oakland (S&P) 2024, "Titan: Efficient Multi-target Directed Greybox Fuzzing"☆56Updated 10 months ago
- Empc: Effective Path Prioritization for Symbolic Execution with Path Cover☆33Updated 7 months ago
- ☆28Updated 5 months ago
- PTABen: Micro-benchmark Suite for Pointer Analysis☆84Updated 2 weeks ago
- The source code of project "LLift" (Enhancing static analysis with LLM)☆81Updated last year
- ☆42Updated 3 years ago
- ☆40Updated 2 years ago
- StateFuzz: System Call-Based State-Aware Linux Driver Fuzzing☆97Updated 2 years ago
- A use-after-free checker based on SVF.☆20Updated 8 years ago
- A Static Differential Analysis Tool of Network Protocol Parsers☆25Updated last year
- Lifting network implementation to precise format specification☆23Updated 8 months ago
- Research artifact for Oakland (S&P) 2022, "BEACON: Directed Grey-Box Fuzzing with Provable Path Pruning"☆41Updated last month
- Linear-time Temporal Logic guided Greybox Fuzzing (ICSE'22)☆56Updated last year
- CheQ: Automatically Identifying Security Checks for Detecting Kernel Semantic Bugs☆45Updated 6 years ago
- Goshawk is a static analyze tool to detect memory corruption bugs in C source codes. It utilizes NLP to infer custom memory management fu…☆101Updated 2 years ago
- Bug detection framework for finding Finger tracable bugs in Linux☆20Updated 9 months ago
- Non-Distinguishable Inconsistencies as a Deterministic Oracle for Detecting Security Bugs☆15Updated 3 years ago
- WhiteFox: White-Box Compiler Fuzzing Empowered by Large Language Models (OOPSLA 2024)☆74Updated 5 months ago
- CAMP: Compiler and Allocator-based Heap Memory Protection (USENIX Security 2024) ✨☆46Updated last year
- Program dependence graph in LLVM☆42Updated 5 months ago
- ☆71Updated last year