enochii / simple-pointer-analysis
Implement pointer analysis prototype(currently including anderson, steensgard)~
☆15Updated 3 years ago
Alternatives and similar repositories for simple-pointer-analysis:
Users that are interested in simple-pointer-analysis are comparing it to the libraries listed below
- Progressive Scrutiny: Incremental Detection of UBI bugs in the Linux Kernel☆29Updated 2 years ago
- Papers related with kernel papers☆13Updated last year
- Code and artifacts related to the Asia CCS 2022 paper☆35Updated 3 years ago
- ☆60Updated 2 years ago
- ☆25Updated 2 years ago
- AFLTeam Collaborative Parallel Fuzzing☆73Updated 2 years ago
- ViDeZZo source code.☆32Updated 3 weeks ago
- In-Kernel Control-Flow Integrity on Commodity OSes using ARM Pointer Authentication☆12Updated 2 years ago
- A Cross-Language Dynamic Information Flow Analysis.☆24Updated 2 years ago
- PARTS / LLVM compiler☆31Updated 5 years ago
- Precise and high-order static points-to/taint analysis based on LLVM IR.☆72Updated 2 years ago
- ☆22Updated 5 years ago
- Dtaint: taint analysis based on DFSan and llvm instrumentation☆24Updated 3 years ago
- An standalone execution trace library built on DynamoRIO.☆22Updated 2 years ago
- a new cfi mechanism☆31Updated 3 years ago
- ☆33Updated last year
- angr源码分析☆33Updated 5 years ago
- AFL++ using the Ball-Larus path profiling algorithm for coverage feedback☆13Updated 2 years ago
- ☆29Updated this week
- ☆34Updated last year
- The fuzzer afl++ is afl with community patches, qemu 5.1 upgrade, collision-free coverage, enhanced laf-intel & redqueen, AFLfast++ power…☆65Updated 2 years ago
- KLEE-fl : Compile Project to Bitcode and Try Fuzzing with KLEE .☆29Updated 5 years ago
- JIGSAW is a fuzzing-based path constraint solver.☆70Updated 7 months ago
- ☆44Updated 4 years ago
- A LLVM Pass with runtime dataflow sanitization☆32Updated 5 years ago
- Assisting Static Analysis with Large Language Models: A ChatGPT Experiment☆30Updated last year
- ☆53Updated 8 months ago
- Generate data-flow graph and def-use graph for a function based on miasm and IDA Pro.☆18Updated 2 years ago
- ☆27Updated 3 years ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆86Updated 8 months ago