andromeda / lya
A Coarse-grained Dynamic Analysis Framework
☆21Updated 2 years ago
Alternatives and similar repositories for lya:
Users that are interested in lya are comparing it to the libraries listed below
- UBGen can generate programs with undefined behaviors (e.g., buffer-overflow, use-after-free, etc.)☆57Updated last week
- The ISLa (Input Specification Language) language & solver.☆62Updated 9 months ago
- A Static Differential Analysis Tool of Network Protocol Parsers☆23Updated last year
- TypeDive: Multi-Layer Type Analysis (MLTA) for Refining Indirect-Call Targets☆92Updated last year
- Static data flow-based analysis of JavaScript files to detect syntactic clones☆23Updated 5 years ago
- autofz: Automated Fuzzer Composition at Runtime☆76Updated last year
- ☆39Updated 4 years ago
- CrashTuner(SOSP2019)☆30Updated 5 years ago
- PTABen: Micro-benchmark Suite for Pointer Analysis☆75Updated this week
- ☆22Updated 2 years ago
- ☆32Updated 5 months ago
- To detect logic bugs in graph database engines by mutating graph query patterns. ICSE'24.☆33Updated last year
- find relevant security papers published in the top-4 conferences (S&P, USENIX, CCS, NDSS)☆183Updated 7 months ago
- Paper and implementation of "SAND: Decoupling Sanitization from Fuzzing for Low Overhead"☆14Updated last month
- ☆20Updated 6 years ago
- Symbolic Program Slicing with LLVM☆79Updated 4 years ago
- Precise and high-order static points-to/taint analysis based on LLVM IR.☆73Updated 2 years ago
- ☆16Updated last month
- ☆54Updated 6 months ago
- WhiteFox: White-Box Compiler Fuzzing Empowered by Large Language Models (OOPSLA 2024)☆55Updated 4 months ago
- Linear-time Temporal Logic guided Greybox Fuzzing (ICSE'22)☆55Updated last year
- ☆33Updated last year
- 🪐 A Database of Existing Security Vulnerabilities Patches to Enable Evaluation of Techniques (single-commit; multi-language)☆38Updated 2 years ago
- Non-Distinguishable Inconsistencies as a Deterministic Oracle for Detecting Security Bugs☆14Updated 2 years ago
- Public release items for the DARPA Space/Time Analysis for Cybersecurity (STAC) program☆27Updated 6 years ago
- Concurrency Paper☆102Updated last year
- ☆28Updated last year
- Use on-demand control- data- flow slicing combined with taint analysis and symbolic execution to produce scalable and precise UB detectio…☆23Updated 3 years ago
- ☆41Updated 5 months ago
- ☆74Updated 2 years ago