cs-au-dk / goat
☆22Updated 2 years ago
Alternatives and similar repositories for goat:
Users that are interested in goat are comparing it to the libraries listed below
- Precise and high-order static points-to/taint analysis based on LLVM IR.☆73Updated 2 years ago
- A Pointer Analysis Framework for Rust☆50Updated last month
- Indexing reachability for context-sensitive data flow analysis.☆11Updated 2 years ago
- Qilin: A New Framework for Supporting Fine-Grained Context-Sensitivity in Java Pointer Analysis☆131Updated this week
- This is the repo for an incremental pointer analysis for Java programs. This repo has been adopted by WALA☆24Updated 2 years ago
- A use-after-free checker based on SVF.☆20Updated 7 years ago
- ☆39Updated 5 months ago
- A unification-based alias analysis and related tools☆31Updated 5 months ago
- A practical fuzzing tool for SMT solvers☆11Updated 7 months ago
- Pointer Analysis with Tunable Precision☆26Updated 9 years ago
- Software Security Analysis Course☆51Updated 3 weeks ago
- 软件工程与形式化方法相关前沿工作阅读与分享☆31Updated last month
- some notes for how to build projects into a single LLVM bitcode file.☆18Updated 6 years ago
- UFO: Predictive Detection of Concurrency Use-After-Free Vulnerabilities☆32Updated 5 years ago
- ☆15Updated last month
- ☆18Updated 3 weeks ago
- ☆39Updated 2 years ago
- Linear-time Temporal Logic guided Greybox Fuzzing (ICSE'22)☆54Updated 11 months ago
- UBGen can generate programs with undefined behaviors (e.g., buffer-overflow, use-after-free, etc.)☆57Updated 11 months ago
- ☆24Updated 10 months ago
- ☆22Updated 2 years ago
- TypeDive: Multi-Layer Type Analysis (MLTA) for Refining Indirect-Call Targets☆91Updated last year
- DBGBench Website:☆18Updated 4 years ago
- RTFM! Automatic Assumption Discovery and VerificationDerivation from Library Document for API Misuse Detection☆16Updated 3 years ago
- A points-to and alias analysis benchmark suite☆40Updated 6 years ago
- Research artifact for Oakland (S&P) 2024, "Titan: Efficient Multi-target Directed Greybox Fuzzing"☆49Updated last month
- Signature-based Static Analysis for Detecting Recurring Vulnerabilities☆47Updated 6 months ago
- Research artifact for Oakland (S&P) 2022, "BEACON: Directed Grey-Box Fuzzing with Provable Path Pruning"☆35Updated 6 months ago
- Program Vulnerability Repair via Inductive Inference☆18Updated last year
- ☆14Updated 9 months ago