dslab-epfl / chef
The Chef symbolic execution platform, based off S2E
☆13Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for chef
- KLEE / CSE Project☆42Updated 4 years ago
- TracerX Symbolic Virtual Machine☆31Updated last week
- Dominator Tree LLVM Pass to Test Satisfiability☆47Updated 8 years ago
- Configurable instrumentation of LLVM bitcode☆33Updated 11 months ago
- Experimental translation of llvm to smt.☆56Updated 4 years ago
- UFO: Predictive Detection of Concurrency Use-After-Free Vulnerabilities☆32Updated 4 years ago
- Vine: The BitBlaze Static Analysis Component☆24Updated 10 years ago
- Fuzzing Parsers with Tokens☆32Updated 3 years ago
- FoRTE-Research's fuzzing benchmarks☆54Updated 5 years ago
- ☆50Updated 6 years ago
- The parser-directed Fuzzer☆38Updated 4 years ago
- Tool for detecting error handling bugs☆22Updated 8 years ago
- Coverage-guided grammar aware fuzzer that uses grammar automatons☆63Updated 2 years ago
- "Seed Selection for Successful Fuzzing" artifact (at ISSTA 2021)☆41Updated 2 years ago
- Scalable Validator for Binary Lifters☆54Updated 4 years ago
- Challenging testcases for fuzzers☆66Updated 8 months ago
- Precise and Signedness Agnostic Interval Analysis for LLVM IR -- This website is obsolete. However, the wrapped interval domain is now im…☆12Updated 6 years ago
- Dytan Taint Analysis Framework on Linux 64-bit☆45Updated 10 years ago
- Binary dynamic, static, and symbolic execution analysis tools for directed test generation☆22Updated 4 years ago
- Tools built using Dyninst or Dyninst component libraries.☆24Updated last year
- Slicing tool for c++ programs using clang AST.☆18Updated 3 years ago
- Proximal Gradient Analysis open source release based on our USENIX Security 2021 paper: "Fine Grained Dataflow Analysis with Proximal Gra…☆32Updated 3 years ago
- KLEE-TAINT - Klee with taint analysis support☆71Updated 7 years ago
- Public release of the tools used to assist in gadget finding.☆41Updated 6 years ago
- A survey by the SEASON lab on symbolic execution tools and techniques. The survey has appeared in ACM CSUR in 2018.☆81Updated 6 years ago
- ☆50Updated 5 years ago
- MemLock: Memory Usage Guided Fuzzing☆33Updated 4 years ago
- Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks☆46Updated 7 years ago
- ☆67Updated 4 years ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆84Updated 6 months ago