batchenRothenberg / AllRepairLinks
☆11Updated 4 years ago
Alternatives and similar repositories for AllRepair
Users that are interested in AllRepair are comparing it to the libraries listed below
Sorting:
- ☆40Updated last year
- ☆25Updated 3 years ago
- ☆28Updated this week
- Program Vulnerability Repair via Inductive Inference☆20Updated last year
- ☆20Updated 3 years ago
- KLEE / CSE Project☆45Updated 5 years ago
- Map2Check: Finding Software Vulnerabilities☆28Updated 4 years ago
- DIG is a numerical invariant generation tool. It infers program invariants or properties over (i) program execution traces or (ii) progra…☆42Updated last week
- ☆25Updated 3 years ago
- ☆19Updated 6 months ago
- ☆39Updated 2 years ago
- An empirical study on patch correctness☆15Updated 2 years ago
- Precise and Signedness Agnostic Interval Analysis for LLVM IR -- This website is obsolete. However, the wrapped interval domain is now im…☆12Updated 7 years ago
- UFO: Predictive Detection of Concurrency Use-After-Free Vulnerabilities☆32Updated 5 years ago
- Enumerative Testing and Bounded Validation of SMT Solvers☆22Updated 3 months ago
- A Fast Floating-Point Satisfiability Solver☆28Updated 6 years ago
- ☆20Updated 6 years ago
- A model-based API Fuzzer for SMT Solvers.☆14Updated last month
- User Guided API Misuse Detection☆29Updated 2 years ago
- UBGen can generate programs with undefined behaviors (e.g., buffer-overflow, use-after-free, etc.)☆60Updated 3 weeks ago
- A tool for testing SMT solvers for incompleteness bugs☆16Updated 2 years ago
- Linear-time Temporal Logic guided Greybox Fuzzing (ICSE'22)☆54Updated last year
- A data dependence analyzer for C program☆21Updated 3 years ago
- ☆22Updated 2 years ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆33Updated 4 months ago
- A System for Debloating C/C++ Programs☆31Updated 3 years ago
- Public release items for the DARPA Space/Time Analysis for Cybersecurity (STAC) program☆27Updated 7 years ago
- A Hybrid Verification Tool for Finding Software Vulnerabilities in IoT Cryptographic Protocols☆16Updated last year
- Version of IKOS abstract interpreter implementing parallel deterministic fixpoint computation☆16Updated 4 years ago
- The public dataset in the paper "PatchDB: A Large-Scale Security Patch Dataset". This paper appears in the 51st Annual IEEE/IFIP Interna…☆40Updated last year