andromeda / lyaLinks
A Coarse-grained Dynamic Analysis Framework
☆22Updated 2 years ago
Alternatives and similar repositories for lya
Users that are interested in lya are comparing it to the libraries listed below
Sorting:
- find relevant security papers published in the top-4 conferences (S&P, USENIX, CCS, NDSS)☆186Updated 11 months ago
- ☆33Updated 10 months ago
- ☆33Updated 9 months ago
- ☆75Updated last month
- ☆25Updated 2 years ago
- ☆84Updated 4 months ago
- Statically Detecting Vulnerable Data Flows in Browser Extensions at Scale☆75Updated 3 years ago
- ☆48Updated last year
- TypeDive: Multi-Layer Type Analysis (MLTA) for Refining Indirect-Call Targets☆96Updated 3 weeks ago
- ☆22Updated 2 years ago
- The ISLa (Input Specification Language) language & solver.☆68Updated last year
- A Static Differential Analysis Tool of Network Protocol Parsers☆25Updated last year
- UBGen can generate programs with undefined behaviors (e.g., buffer-overflow, use-after-free, etc.)☆60Updated 2 months ago
- The public dataset in the paper "PatchDB: A Large-Scale Security Patch Dataset". This paper appears in the 51st Annual IEEE/IFIP Interna…☆42Updated last year
- VFCFinder: Searching for the Missing Vulnerability Fixing Commits☆29Updated last year
- autofz: Automated Fuzzer Composition at Runtime☆79Updated last year
- [USENIX SECURITY'19] PeX: A Permission Check Analysis Framework for Linux Kernel☆77Updated 3 years ago
- Public release items for the DARPA Space/Time Analysis for Cybersecurity (STAC) program☆27Updated 7 years ago
- A library to facilitate the static analysis of Android apps☆15Updated 3 weeks ago
- Compiler-assisted Code Randomization (CCR) Toolchain☆62Updated 2 years ago
- An autonomous LLM-agent for large-scale, repository-level code auditing☆201Updated 3 weeks ago
- A Static Analysis Tool For Android Apps☆20Updated last week
- Symbolic Program Slicing with LLVM☆82Updated 5 years ago
- ☆39Updated 4 years ago
- Use on-demand control- data- flow slicing combined with taint analysis and symbolic execution to produce scalable and precise UB detectio…☆25Updated 3 years ago
- Practical Data-Only Attack Generation☆40Updated last year
- UFO: Predictive Detection of Concurrency Use-After-Free Vulnerabilities☆33Updated 5 years ago
- ☆24Updated 4 years ago
- Modular static malicious JavaScript detection system☆71Updated 4 years ago
- ☆32Updated last year