SecurityLab-UCD / IRFuzzerLinks
[ICSE'25] Specialized Fuzzing for LLVM Backend Code Generation
☆17Updated 6 months ago
Alternatives and similar repositories for IRFuzzer
Users that are interested in IRFuzzer are comparing it to the libraries listed below
Sorting:
- Linear-time Temporal Logic guided Greybox Fuzzing (ICSE'22)☆56Updated last year
- ☆34Updated 3 years ago
- ROSA: Finding Backdoors with Fuzzing☆25Updated 3 months ago
- A Hybrid Alias Analysis☆19Updated 2 years ago
- UBGen can generate programs with undefined behaviors (e.g., buffer-overflow, use-after-free, etc.)☆61Updated 5 months ago
- ☆27Updated 2 years ago
- GrayC: Greybox Fuzzing of Compilers and Analysers for C☆60Updated last year
- Sys, but no longer in Haskell☆18Updated 3 years ago
- JIGSAW is a fuzzing-based path constraint solver.☆70Updated last year
- Grey-box fuzzer SIVO☆14Updated 4 years ago
- AFL++ using the Ball-Larus path profiling algorithm for coverage feedback☆15Updated 2 years ago
- ☆32Updated 2 years ago
- Progressive Scrutiny: Incremental Detection of UBI bugs in the Linux Kernel☆32Updated 3 years ago
- Evolving fuzzers with large language models☆17Updated last year
- FastKLEE: Faster Symbolic Execution via Reducing Redundant Bound Checking of Type-Safe Pointers☆21Updated 2 years ago
- BDA: Practical Dependence Analysis for Binary Executables by Unbiased Whole-program Path Sampling and Per-path Abstract Interpretation☆30Updated 4 years ago
- A fuzzer for SMT solvers☆21Updated last month
- Library for manipulating gdb in batch mode☆20Updated last year
- Static range analysis for the LLVM compiler infrastructure.☆56Updated 6 years ago
- ☆34Updated last month
- AFL enhanced for concurrency bug and vulnerabilities☆19Updated 5 years ago
- LLAP is an LLVM-based tool for generating enriched program dependency graphs (ePDGs) from program source code that are suitable for use i…☆14Updated 2 years ago
- Thesis code☆26Updated 2 years ago
- An approximate solver for concolic execution☆19Updated 5 months ago
- Indexing reachability for context-sensitive data flow analysis.☆13Updated 3 years ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆34Updated 8 months ago
- FLOWMATRIX: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation, USENIX Security'22☆28Updated 2 years ago
- Source code of a few LLVM passes that I wrote to learn and that now I am sharing for my LLVM course for security engineering☆28Updated 3 years ago
- ☆39Updated 3 years ago
- Decompiler Fuzzing Test with EMI mutation☆16Updated 5 years ago