ZhouyangJia / EH-MinerLinks
Mining Error-Handling Bugs without Error Specification Input
☆15Updated 5 years ago
Alternatives and similar repositories for EH-Miner
Users that are interested in EH-Miner are comparing it to the libraries listed below
Sorting:
- ☆12Updated 5 months ago
- Teaching and Learning Software Analysis via SVF☆211Updated last month
- ☆26Updated last week
- ☆11Updated last year
- Detect missing check bugs in OS kernels☆111Updated 2 years ago
- Bug detection framework for finding Finger tracable bugs in Linux☆21Updated 7 months ago
- This is an evaluation set for the problem of directed/targeted test input generation. We use it to benchmark the ability of Large Languag…☆33Updated 8 months ago
- Configuration dependency analysis for cloud software☆24Updated 3 years ago
- Recent Paper About Bug Detection☆31Updated 6 years ago
- This repository contains the artifact for the SOSP'21 paper: Sishuai Gong, Deniz Altınbüken, Pedro Fonseca, Petros Maniatis, "Snowboard:…☆26Updated 5 months ago
- CheQ: Automatically Identifying Security Checks for Detecting Kernel Semantic Bugs☆45Updated 6 years ago
- TypeDive: Multi-Layer Type Analysis (MLTA) for Refining Indirect-Call Targets☆97Updated last week
- Pre-built bitcode files for the Linux kernel☆22Updated 6 years ago
- For our ISSTA22 paper "DocTer: Documentation-Guided Fuzzing for Testing Deep Learning API Functions" by Danning Xie, Yitong Li, Mijung Ki…☆37Updated 3 years ago
- SanRazor is a sanitizer check reduction tool aiming to incur little overhead while retaining all important sanitizer checks.☆54Updated 4 years ago
- [ICSE 2022] Controlled Concurrency Testing via Periodical Scheduling☆36Updated 3 years ago
- configuration evolution dataset☆18Updated 4 years ago
- tool of llm-based indirect-call analyzer☆32Updated 9 months ago
- Detecting Concurrency Memory Corruption Vulnerabilities (ESEC/FSE 2019)☆14Updated last year
- Non-Distinguishable Inconsistencies as a Deterministic Oracle for Detecting Security Bugs☆14Updated 3 years ago
- Lifting network implementation to precise format specification☆23Updated 7 months ago
- PTABen: Micro-benchmark Suite for Pointer Analysis☆84Updated 2 weeks ago
- ☆40Updated last year
- UBGen can generate programs with undefined behaviors (e.g., buffer-overflow, use-after-free, etc.)☆62Updated 6 months ago
- ☆36Updated 4 months ago
- ☆28Updated 3 months ago
- A Static Differential Analysis Tool of Network Protocol Parsers☆24Updated last year
- A use-after-free checker based on SVF.☆20Updated 7 years ago
- [USENIX SECURITY'19] PeX: A Permission Check Analysis Framework for Linux Kernel☆77Updated 3 years ago
- ☆60Updated last year