eth-sri / learch
☆40Updated last year
Alternatives and similar repositories for learch:
Users that are interested in learch are comparing it to the libraries listed below
- Recent Paper About Bug Detection☆30Updated 5 years ago
- Precise and high-order static points-to/taint analysis based on LLVM IR.☆72Updated 2 years ago
- User Guided API Misuse Detection☆27Updated 2 years ago
- ☆25Updated 3 years ago
- The public dataset in the paper "PatchDB: A Large-Scale Security Patch Dataset". This paper appears in the 51st Annual IEEE/IFIP Interna…☆38Updated last year
- 20 benchmark programs☆46Updated 3 years ago
- The official repository of "GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics". The paper will appear in the IE…☆43Updated last year
- ☆39Updated 2 years ago
- RTFM! Automatic Assumption Discovery and VerificationDerivation from Library Document for API Misuse Detection☆16Updated 3 years ago
- ☆39Updated 4 years ago
- APISan: Sanitizing API Usages through Semantic Cross-Checking☆63Updated 3 years ago
- ☆44Updated 2 years ago
- ☆51Updated 4 years ago
- Lifting network implementation to precise format specification☆23Updated 3 months ago
- JIGSAW is a fuzzing-based path constraint solver.☆70Updated 8 months ago
- Research artifact for Oakland (S&P) 2022, "BEACON: Directed Grey-Box Fuzzing with Provable Path Pruning"☆33Updated 4 months ago
- ☆22Updated 5 months ago
- OBsan: An Out-Of-Bound Sanitizer to Harden DNN Executables☆17Updated last year
- Symbolic Program Slicing with LLVM☆77Updated 4 years ago
- Research artifact for Oakland (S&P) 2024, "Titan: Efficient Multi-target Directed Greybox Fuzzing"☆48Updated this week
- ☆28Updated last year
- PTABen: Micro-benchmark Suite for Pointer Analysis☆73Updated this week
- SLIME is a novel program-sensitive fuzzer that designs multiple property-aware queues and leverages a customized Upper Confidence Bound V…☆20Updated last year
- UFO: Predictive Detection of Concurrency Use-After-Free Vulnerabilities☆32Updated 5 years ago
- Reassembly is Hard: A Reflection on Challenges and Strategies (USENIX Security '23)☆31Updated 3 weeks ago
- ☆68Updated 3 years ago
- TypeDive: Multi-Layer Type Analysis (MLTA) for Refining Indirect-Call Targets☆90Updated 10 months ago
- "Seed Selection for Successful Fuzzing" artifact (at ISSTA 2021)☆42Updated 2 years ago
- ☆37Updated 3 months ago
- ☆47Updated 4 years ago