aseec-lab / llms-for-code-analysis
☆23Updated 2 months ago
Related projects ⓘ
Alternatives and complementary repositories for llms-for-code-analysis
- Assisting Static Analysis with Large Language Models: A ChatGPT Experiment☆28Updated last year
- LLAP is an LLVM-based tool for generating enriched program dependency graphs (ePDGs) from program source code that are suitable for use i…☆13Updated last year
- Code and artifacts related to the Asia CCS 2022 paper☆34Updated 3 years ago
- ☆24Updated 9 months ago
- A tool for automatically identifying syscall-guard variables☆32Updated 2 months ago
- ☆26Updated last year
- ☆10Updated 4 years ago
- aurora-d☆20Updated 2 years ago
- ☆21Updated 8 months ago
- Papers on concurrency vulnerability analysis, including multithreaded programs, multi-tasking programs and interrupt driven programs.☆12Updated last year
- KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities (Best Practical Paper Award of RAID 2024)☆37Updated 2 weeks ago
- Code for UI, backend, engine and statistical analysis for RE☆20Updated 3 years ago
- ☆24Updated last year
- ☆17Updated 4 years ago
- [CCS'24] An LLM-based, fully automated fuzzing tool for option combination testing.☆45Updated 2 weeks ago
- A set of Code-ql/Joern queries to find vulnerabilities☆54Updated 3 years ago
- SecLLMHolmes is a generalized, fully automated, and scalable framework to systematically evaluate the performance (i.e., accuracy and rea…☆37Updated this week
- SymFusion: Hybrid Instrumentation for Concolic Execution☆16Updated last year
- SyzBridge is a research project that adapts Linux upstream PoCs to downstream distributions. It provides rich interfaces that allow you t…☆27Updated 3 months ago
- A gdb for fuzzing☆20Updated 2 years ago
- This is the project for the paper “Large-scale Security Measurements on the Android Firmware Ecosystem” in ICSE2022☆35Updated last year
- Prototype of the paper "APICraft: Fuzz Driver Generation for Closed-source SDK Libraries".☆64Updated 2 years ago
- Detecting Flow of Sensitive Data in Mini-Programs with Static Taint Analysis☆73Updated 7 months ago
- ☆8Updated 3 months ago
- ☆23Updated 8 months ago
- ☆70Updated 3 years ago
- An Automated Heap Feng Shui Tool☆16Updated 2 years ago
- A list of data-only attacks☆19Updated 2 months ago
- ☆22Updated 2 years ago