Vulnerability-Detection / z3-study
z3 solver 学习
☆48Updated last year
Alternatives and similar repositories for z3-study:
Users that are interested in z3-study are comparing it to the libraries listed below
- Code and artifacts related to the Asia CCS 2022 paper☆35Updated 3 years ago
- A Cross-Language Dynamic Information Flow Analysis.☆24Updated 2 years ago
- A CTF fuzz powerd by protobuf.☆15Updated 2 years ago
- 一个中文版本的 LibAFL 笔记,主要内容是 LibAFL 原理相关的内容,同时也附加一些 LibAFL 使用方面的 tips ,方便查阅和参考。☆26Updated last year
- 软件工程与形式化方法相关前沿工作阅读与分享☆30Updated last week
- iot安全题 目学习记录☆16Updated 3 years ago
- Dtaint: taint analysis based on DFSan and llvm instrumentation☆24Updated 3 years ago
- ☆60Updated 2 years ago
- ☆34Updated 2 years ago
- Qilin: A New Framework for Supporting Fine-Grained Context-Sensitivity in Java Pointer Analysis☆129Updated last month
- Precise and high-order static points-to/taint analysis based on LLVM IR.☆72Updated 2 years ago
- Papers related with kernel papers☆13Updated last year
- ☆17Updated 2 years ago
- Tango: Extracting Higher-Order Feedback through State Inference☆14Updated 5 months ago
- Code for UI, backend, engine and statistical analysis for RE☆20Updated 3 years ago
- Goshawk is a static analyze tool to detect memory corruption bugs in C source codes. It utilizes NLP to infer custom memory management fu…☆81Updated last year
- ☆72Updated 2 years ago
- IDA Hexrays To Joern☆33Updated 2 months ago
- uacatcher open source repo☆20Updated last year
- angr源码分析☆33Updated 5 years ago
- Implement pointer analysis prototype(currently including anderson, steensgard)~☆15Updated 3 years ago
- KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities (Best Practical Paper Award of RAID 2024)☆42Updated last week
- ☆71Updated 3 years ago
- Binary Feature(ACFG) Database for DataCon2022-IoT-Challenge-2☆22Updated 2 years ago
- ☆18Updated last year
- AFL/AFL++ version FishFuzz☆88Updated 10 months ago
- Assisting Static Analysis with Large Language Models: A ChatGPT Experiment☆30Updated last year
- Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation☆12Updated last month
- Precision-guided context sensitivity for pointer analysis☆59Updated last year
- Papers on concurrency vulnerability analysis, including multithreaded programs, multi-tasking programs and interrupt driven programs.☆13Updated 2 years ago