SWAT-project / SWAT
SWAT, a dynamic symbolic execution engine for Java Applications that uses ASM for on-the-fly byte code instrumentation.
☆31Updated 11 months ago
Alternatives and similar repositories for SWAT:
Users that are interested in SWAT are comparing it to the libraries listed below
- A symbolic Java virtual machine for program analysis, verification and test generation☆109Updated 2 months ago
- This is an implementation of the Language Server Protocol for Jimple. It enables your IDE to provide code exploring features while workin…☆12Updated last year
- Soot-based taint analysis with internal Java fluent interface for security specifications in fluentTQL implemented with MagpieBridge to s…☆17Updated last month
- Qilin: A New Framework for Supporting Fine-Grained Context-Sensitivity in Java Pointer Analysis☆129Updated last month
- COVA - A static analysis tool to compute path conditions☆32Updated 2 years ago
- Plume is a code representation benchmarking library with options to extract the AST from Java bytecode and store the result in various gr…☆73Updated 5 months ago
- Heaps Don't Lie! Analyzes standard JVM and Android heap snapshots to improve the completeness of program analysis tools such as Doop.☆14Updated 10 months ago
- A Static Code Feature Extraction Tool for Java and Android☆20Updated last year
- CodeHawk Abstract Interpretation Engine and Analyzers☆66Updated last week
- Efficient and Precise Pointer-Tracking Data-Flow Framework☆66Updated 3 months ago
- ☆57Updated 3 weeks ago
- A program slicer for Java, based on the system dependence graph (SDG).☆65Updated last year
- ☆21Updated 2 years ago
- Industrial IR-based static analysis framework for Java bytecode☆162Updated 11 months ago
- Binary rewriting approach with fork server support to fuzz Java applications with afl-fuzz.☆90Updated 6 years ago
- A dynamic symbolic analysis tool for Java☆116Updated 5 years ago
- Basic Gradle configuration and example drivers to get started with WALA☆29Updated 3 months ago
- Android Benchmark Reproduction Framework☆11Updated 3 years ago
- LLVM meets Code Property Graphs☆91Updated 4 years ago
- A Pointer Analysis Framework for Rust☆50Updated last month
- Taint analysis implementation based on Heros and Soot☆44Updated 10 months ago
- Static checker for Java☆86Updated 2 months ago
- Precision-guided context sensitivity for pointer analysis☆60Updated last year
- Mutation-guided mutation-based fuzz testing☆44Updated 8 months ago
- Codyze is a static analyzer for Java, C, C++ based on code property graphs☆87Updated 2 months ago
- The official repo of Doop, the declarative pointer analysis framework.☆173Updated 2 weeks ago
- ☆27Updated 2 years ago
- Signature-based Static Analysis for Detecting Recurring Vulnerabilities☆47Updated 6 months ago
- Artifact for ICSE 2023☆48Updated 2 years ago
- Detecting Flow of Sensitive Data in Mini-Programs with Static Taint Analysis☆74Updated last year