chenruibuaa / racebench
Examples for NASAC 2019 interrupt race detection competition
☆9Updated 5 years ago
Alternatives and similar repositories for racebench:
Users that are interested in racebench are comparing it to the libraries listed below
- PTABen: Micro-benchmark Suite for Pointer Analysis☆75Updated last week
- A unification-based alias analysis and related tools☆32Updated 6 months ago
- UFO: Predictive Detection of Concurrency Use-After-Free Vulnerabilities☆32Updated 5 years ago
- ☆39Updated last year
- ☆14Updated 9 months ago
- A use-after-free checker based on SVF.☆20Updated 7 years ago
- CheQ: Automatically Identifying Security Checks for Detecting Kernel Semantic Bugs☆43Updated 5 years ago
- Pre-built bitcode files for the Linux kernel☆22Updated 5 years ago
- ☆79Updated 3 weeks ago
- ☆24Updated 10 years ago
- APISan: Sanitizing API Usages through Semantic Cross-Checking☆63Updated 3 years ago
- Lifting network implementation to precise format specification☆24Updated 2 weeks ago
- Detecting Concurrency Memory Corruption Vulnerabilities (ESEC/FSE 2019)☆11Updated last year
- ☆18Updated 4 months ago
- ☆39Updated 2 years ago
- Pointer Analysis with Tunable Precision☆26Updated 9 years ago
- ☆49Updated 4 years ago
- ☆21Updated 8 months ago
- Origin-sensitive Control Flow Integrity (OS-CFI) - USENIX Security 2019☆37Updated 3 years ago
- Repository for ASE 2017 paper, "Modular Verification of Interrupt-driven Software".☆11Updated 5 years ago
- A Static Differential Analysis Tool of Network Protocol Parsers☆23Updated last year
- Program Vulnerability Repair via Inductive Inference☆20Updated last year
- Use on-demand control- data- flow slicing combined with taint analysis and symbolic execution to produce scalable and precise UB detectio…☆23Updated 3 years ago
- [ICSE 2022] Controlled Concurrency Testing via Periodical Scheduling☆31Updated 2 years ago
- ☆24Updated last month
- Program analysis and verification framework☆14Updated this week
- ☆38Updated last year
- TypeDive: Multi-Layer Type Analysis (MLTA) for Refining Indirect-Call Targets☆92Updated last year
- Program dependence graph in LLVM☆35Updated 9 months ago
- RTFM! Automatic Assumption Discovery and VerificationDerivation from Library Document for API Misuse Detection☆16Updated 3 years ago